SlideShare una empresa de Scribd logo
1 de 112
Descargar para leer sin conexión
CyberCyber Threats & Defence!Threats & Defence!
-- “Intelligent CyberSecurity”“Intelligent CyberSecurity”--
1
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
-- “Intelligent CyberSecurity”“Intelligent CyberSecurity”--
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Tatiana, Alice & AbigailTatiana, Alice & Abigail –– Securing YOUR Life !Securing YOUR Life !
КиберКибер Угрозы и ЗащитаУгрозы и Защита
УУмный КиберБезопасностьмный КиберБезопасность
2
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
УУмный КиберБезопасностьмный КиберБезопасность
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
CyberCyber Futures & Defence:Futures & Defence: “Dual Themes”“Dual Themes”
Theme (1)”Theme (1)” -- “Security Futures:“Security Futures: 20182018--2025+2025+” :” : TTechnology,echnology, TTools andools and TTrends...rends...
-- Bringing CyberSecurity toBringing CyberSecurity to YOURYOUR Board Room with Budget & Mission!Board Room with Budget & Mission!
-- FutureFuture CyberCyber--ScenariosScenarios for Integrated, Adaptive, Intelligent Security!for Integrated, Adaptive, Intelligent Security!
-- New CyberSecurity Toolkits to DefendNew CyberSecurity Toolkits to Defend YOURYOUR Business Operations!Business Operations!
““ CyberVision: Machine Learning, AI & Neural Security“CyberVision: Machine Learning, AI & Neural Security“ 2121stst Nov: 09:40Nov: 09:40–– 10:2010:20
3
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ThemeTheme (2)(2) –– “Cyber Threats & Defence”:“Cyber Threats & Defence”: Intelligent CyberSecurity for OUR 21Intelligent CyberSecurity for OUR 21stst C...C...
-- TOP 10 CyberThreatsTOP 10 CyberThreats: Exploration, Penetration and Attack!: Exploration, Penetration and Attack!
-- RecentRecent Case StudiesCase Studies of Cyber Crime, Terror & Political Attacks!of Cyber Crime, Terror & Political Attacks!
-- DevelopingDeveloping YOURYOUR Action Plans & Cybersecurity Programme!Action Plans & Cybersecurity Programme!
““CyberDefenceCyberDefence: Real: Real--Time Learning, Detection & Alerts”Time Learning, Detection & Alerts” 2121stst Nov: 14:30Nov: 14:30 –– 15:1015:10
Download SlideDownload Slides:s: www.valentina.net/Seville2017/www.valentina.net/Seville2017/
Topics suggestedTopics suggested @@ GenoaGenoa –– June 2017June 2017
1.1. CyberCrime &CyberCrime & CyberTerrorCyberTerror: Who is the Enemy?: Who is the Enemy?
2.2. EffectiveEffective InfoSecInfoSec:: Boardroom Responsibility(CSO)Boardroom Responsibility(CSO)
3.3. Virus Threat! :Virus Threat! : Aware GlobalAware Global -- Protect Local !Protect Local !
4.4. CyberSecurity in the Financial Services SectorCyberSecurity in the Financial Services Sector
5.5. Security Strategies for Corporate NetworksSecurity Strategies for Corporate Networks
4
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
5.5. Security Strategies for Corporate NetworksSecurity Strategies for Corporate Networks
6.6. Threats to IT Infrastructure & Countermeasures!Threats to IT Infrastructure & Countermeasures!
7.7. Effective IT Security:Effective IT Security: Prevent & Adapt to ThreatsPrevent & Adapt to Threats
......We’ll respond to......We’ll respond to ALLALL these during this talk onthese during this talk on
“Cyber Threats & Defence”:“Cyber Threats & Defence”: Intelligent SecurityIntelligent Security
11 ––“TOP 10 Cyber Threats & Attacks”“TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns!
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6–Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
5
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6–Real-Time Cyber Alert and Attack!
“Cyber Attack!”“Cyber Attack!”
7 –In-Depth: Security for Critical Sectors 8– YOURYOUR Operational Cyber Defence 9 –YOURYOUR Cyber Campaign Action Plan!
11 ––“TOP 10 Cyber Threats & Attacks”“TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns!
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6–Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
11 ––“TOP 10 Cyber Threats & Attacks!”“TOP 10 Cyber Threats & Attacks!”
CyberCyberCrimeCrime –– CyberCyberTerrorTerror –– CyberCyberWarWar
6
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6–Real-Time Cyber Alert and Attack!
“Cyber Attack!”“Cyber Attack!”
7 –In-Depth: Security for Critical Sectors 8– YOURYOUR Operational Cyber Defence 9 –YOURYOUR Cyber Campaign Action Plan!
CyberCyberCrimeCrime –– CyberCyberTerrorTerror –– CyberCyberWarWar
““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar””
1)1) Media:Media: Global News Reports of Cyber Attacks!
2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats,
& Mechanisms exploited by “Bad Guys”!
3)3) Cyber Reality:Cyber Reality: Understand the Criminal &
Political Reality behind Cyber Attacks!
7
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Political Reality behind Cyber Attacks!
4)4) Practical Defence:Practical Defence: Discuss Practical Cyber
Defence to these Threats for YOUR Business!
.....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some
combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
8
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
9
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Red Alert!Red Alert!
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
10
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
Red Alert!Red Alert!
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
11
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
“BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
“Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!”
•• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by
Role during Criminal/Political Cyber Campaign:
ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack
•• Cyber AttacksCyber Attacks may be planned by Criminals,
12
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Cyber AttacksCyber Attacks may be planned by Criminals,
Terrorists & Hacktivists for weeks & months!
•• Research & Intelligence:Research & Intelligence: Major Attacks will be
based on In-Depth Research, “Insider
Intelligence”, and Cyber “Hackers” Toolkit!...
RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack
13
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
Guide toGuide to Cyber ScamsCyber Scams: March 2017: March 2017
Recommended!Recommended!
14
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
https://beta.met.police.uk/globalassets/downloads/fraud/thehttps://beta.met.police.uk/globalassets/downloads/fraud/the--littlelittle--bookbook--cybercyber--scams.pdfscams.pdf
Recommended!Recommended!
1 –“TOP 10 Cyber Threats & Attacks” 22 ––CyberCyber Case Studies: Recent AttacksCase Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns!
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
15
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 –YOURYOUR Cyber Campaign Action Plan!
1 –“TOP 10 Cyber Threats & Attacks” 22 ––CyberCyber Case Studies: Recent AttacksCase Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns!
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
22 ––Cyber Case Studies: Recent AttacksCyber Case Studies: Recent Attacks
RansomwareRansomware & ID Theft!...& ID Theft!...
16
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 –YOURYOUR Cyber Campaign Action Plan!
RansomwareRansomware & ID Theft!...& ID Theft!...
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
17
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
18
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
19
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
20
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
21
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Massive HackMassive Hack –– EQUIFAXEQUIFAX -- Sept 2017Sept 2017
22
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Personal IDs Stolen fromPersonal IDs Stolen from 144Million+144Million+ Clients (USA, UK...)Clients (USA, UK...)
....Credit Cards, Driving Licences, Social Security,....Credit Cards, Driving Licences, Social Security, eMaileMail........
CyberCrime:CyberCrime: Russian Financial ServicesRussian Financial Services
6+ Russian Banks “Hacked” as6+ Russian Banks “Hacked” as
well as other target CIS Bankswell as other target CIS Banks
Press Report: TASS News AgencyPress Report: TASS News Agency
-- 11stst June 2016June 2016 --
23
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
well as other target CIS Bankswell as other target CIS Banks
Trojan “Lurk” Malware ToolkitTrojan “Lurk” Malware Toolkit
At least 1.7Bn Roubles StolenAt least 1.7Bn Roubles Stolen
50 “Cyber Hackers” Arrested50 “Cyber Hackers” Arrested
Digital Forensics executed byDigital Forensics executed by
KasperskyKaspersky Labs, FSB andLabs, FSB and SberbankSberbank
Malware Attack:Malware Attack: SWIFTSWIFT Bank NetBank Net –– 20162016
Cyber Analysis by BAE SystemsCyber Analysis by BAE Systems
24
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Multiple Cyber Attacks including Cyber Heist ofMultiple Cyber Attacks including Cyber Heist of $951M$951M fromfrom
Bangladesh Central BankBangladesh Central Bank of whichof which $81M$81M remains missing!remains missing!
Malware Attack:Malware Attack: SWIFTSWIFT Bank NetBank Net –– 20162016
Cyber Analysis by BAE SystemsCyber Analysis by BAE Systems
25
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Multiple Cyber Attacks including Cyber Heist ofMultiple Cyber Attacks including Cyber Heist of $951M$951M fromfrom
Bangladesh Central BankBangladesh Central Bank of whichof which $81M$81M remains missing!remains missing!
ProjectProject SauronSauron:: CyberEspionageCyberEspionage -- 20162016
Analysed by SymantecAnalysed by Symantec
andand KasperskyKaspersky Labs...Labs...
-- August 2016August 2016 --
KnownKnown CyberTargetsCyberTargets
include: Russia, China,include: Russia, China,
Iran, Rwanda, ItalyIran, Rwanda, Italy
Sweden & BelgiumSweden & Belgium
26
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
PowerfulPowerful APT MalwareAPT Malware that targetedthat targeted Critical National InfrastructureCritical National Infrastructure::
Top LevelTop Level Government. Military, Telecoms, Finance and R&D CentresGovernment. Military, Telecoms, Finance and R&D Centres
Sweden & BelgiumSweden & Belgium
OtherOther “State“State--Designed”Designed”
Cyber Malware include:Cyber Malware include:
StuxnetStuxnet,, DuquDuqu, Flame,, Flame,
Equation andEquation and ReginRegin......
ProjectProject SauronSauron:: CyberEspionageCyberEspionage -- 20162016
Analysed by SymantecAnalysed by Symantec
andand KasperskyKaspersky Labs...Labs...
-- August 2016August 2016 --
KnownKnown CyberTargetsCyberTargets
include: Russia, China,include: Russia, China,
Iran, Rwanda, ItalyIran, Rwanda, Italy
Sweden & BelgiumSweden & Belgium
27
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
PowerfulPowerful APT MalwareAPT Malware that targetedthat targeted Critical National InfrastructureCritical National Infrastructure::
Top LevelTop Level Government. Military, Telecoms, Finance and R&D CentresGovernment. Military, Telecoms, Finance and R&D Centres
Sweden & BelgiumSweden & Belgium
OtherOther “State“State--Designed”Designed”
Cyber Malware include:Cyber Malware include:
StuxnetStuxnet,, DuquDuqu, Flame,, Flame,
Equation andEquation and ReginRegin......
CyberEspionageCyberEspionage in Asiain Asia--Pacific RegionPacific Region
Attacks fromAttacks from 20122012
onwards byonwards by HellsingHellsing
APTAPT Victims were inVictims were in
Malaysia, PhilippinesMalaysia, Philippines
Indonesia, India, USAIndonesia, India, USA
28
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
onwards byonwards by HellsingHellsing
andand NaikonNaikon GroupsGroups
Targets ofTargets of APTAPT AttacksAttacks
werewere GovernmentGovernment &&
Diplomatic AgenciesDiplomatic Agencies
Analysed byAnalysed by KasperskyKaspersky LabsLabs:: April 2015April 2015
MassiveMassive DDoSDDoS Attack usingAttack using MiraiMirai BotNetBotNet
fromfrom “Internet of Things”“Internet of Things” -- 2121stst Oct 2016Oct 2016
29
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
More thanMore than 500,000 “IoT”500,000 “IoT” Devices suchDevices such
asas CCTVCCTV && Web CamsWeb Cams used asused as “Bots”!...“Bots”!...
“Internet of Threats”!“Internet of Threats”!
CyberAttack:CyberAttack: Tesco BankTesco Bank –– Nov 2016Nov 2016
30
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
66thth Nov 2016:Nov 2016: Cyber CriminalsCyber Criminals fromfrom Brazil & SpainBrazil & Spain hackhack 40,00040,000
TESCO Bank AccountsTESCO Bank Accounts with reported Theft ofwith reported Theft of £2.5m£2.5m fromfrom 9,0009,000
CyberAttack:CyberAttack: SberBankSberBank -- СбербанкСбербанк:: 88thth Nov 2016Nov 2016
31
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
MassiveMassive DDoSDDoS AttackAttack fromfrom 24,000 “24,000 “BotBot” Devices (Internet of Things)” Devices (Internet of Things)
HitsHits SberBankSberBank, Alfa Bank, Moscow Bank,, Alfa Bank, Moscow Bank, RosBankRosBank, Moscow Exchange, Moscow Exchange
- PeakPeak Web IP Requests of 660,000/Sec660,000/Sec quoted by KasperskyKaspersky LabsLabs -
CyberAttack:CyberAttack: SberBankSberBank -- СбербанкСбербанк:: 88thth Nov 2016Nov 2016
32
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
MassiveMassive DDoSDDoS AttackAttack fromfrom 24,000 “24,000 “BotBot” Devices (Internet of Things)” Devices (Internet of Things)
HitsHits SberBankSberBank, Alfa Bank, Moscow Bank,, Alfa Bank, Moscow Bank, RosBankRosBank, Moscow Exchange, Moscow Exchange
- PeakPeak Web IP Requests of 660,000/Sec660,000/Sec quoted by KasperskyKaspersky LabsLabs -
Cyber Threat:Cyber Threat: “Banking Theft”“Banking Theft”–– CarbanakCarbanak
33
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
EstimatedEstimated ~$1Billion~$1Billion stolenstolen
fromfrom ~100+~100+ Banks & FinancialBanks & Financial
Institutions duringInstitutions during 2013/20142013/2014
Researched by “Researched by “KasperskyKaspersky Labs”Labs”
CyberSecurity:CyberSecurity: Market SectorsMarket Sectors
•• AntiAnti--Virus/FirewallVirus/Firewall
•• ID AuthenticationID Authentication
•• Encryption/PrivacyEncryption/Privacy
•• Risk & ComplianceRisk & Compliance
•• Mobile Device SecurityMobile Device Security
•• AI & Machine LearningAI & Machine Learning
•• Enterprise IoT SecurityEnterprise IoT Security
•• Cloud Security ServicesCloud Security Services
•• Big Data ProtectionBig Data Protection
•• RT Log/Event AnalyticsRT Log/Event Analytics
34
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Mobile Device SecurityMobile Device Security
•• AntiAnti--Fraud MonitoringFraud Monitoring
•• Website ProtectionWebsite Protection
•• S/W Code VerificationS/W Code Verification
•• RT Log/Event AnalyticsRT Log/Event Analytics
•• RealReal--Time Threat MapsTime Threat Maps
•• Smart BiometricsSmart Biometrics
•• Training & CertificationTraining & Certification
Global Trend is towardsGlobal Trend is towards Adaptive & Intelligent Cybersecurity Solutions/ServicesAdaptive & Intelligent Cybersecurity Solutions/Services...
....Traditional....Traditional AntiAnti--Virus/Firewall ToolsVirus/Firewall Tools no longer fully effective againstno longer fully effective against “Bad Guys”“Bad Guys”!!
1 –“TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 33 –– Cyber Hack & Attack Campaigns!Cyber Hack & Attack Campaigns!
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
35
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 –YOURYOUR Cyber Campaign Action Plan!
1 –“TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 33 –– Cyber Hack & Attack Campaigns!Cyber Hack & Attack Campaigns!
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
33 –– Cyber Hack & Attack Campaigns!Cyber Hack & Attack Campaigns!
ProfessionalProfessional “Bad Guys”!...“Bad Guys”!...
36
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 –YOURYOUR Cyber Campaign Action Plan!
ProfessionalProfessional “Bad Guys”!...“Bad Guys”!...
“21stC“21stC CyberCyber Hack & AttackHack & Attack CampaignsCampaigns””
•• CyberCrime & TerrorismCyberCrime & Terrorism are now organised on
an “Industrial Scale” with Toolkits & BotNets for
“Hire by the Hour” on the “DarkWeb”...
•• Major Cyber AttacksMajor Cyber Attacks demand the Professional
Skills of a well managed Criminal Enterprise...
37
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Skills of a well managed Criminal Enterprise...
•• The Cyber EnterpriseThe Cyber Enterprise may be a small CyberCell
of 3 or 4 “Staff” and scale up to teams of
hundreds in some Cyber Banking “Heists”...
.....Next we explore some Cyber Criminal Skills........Next we explore some Cyber Criminal Skills...
MainMain CyberCyber Players and their MotivesPlayers and their Motives
•• Cyber Criminals:Cyber Criminals: Seeking commercial gain from
hacking banks & financial institutions as well a phishing
scams & computer ransom ware
•• Cyber Terrorists:Cyber Terrorists: Mission to penetrate & attack critical
assets, and national infrastructure for aims relating to
political power & “branding”
•• Cyber Espionage:Cyber Espionage: Using stealthy IT Malware to
38
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Cyber Espionage:Cyber Espionage: Using stealthy IT Malware to
penetrate both corporate & military data servers in
order to obtain plans & intelligence
•• Cyber Hackivists:Cyber Hackivists: Groups such as “Anonymous” with
Political Agendas that hack sites & servers to virally
communicate the “message” for specific campaigns
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
39
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
“Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys”
• Mitigating Global Crime & Terrorism requires us to
Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with
Intelligent Networked Computing Systems:
–– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles
– Track On-Line Social MediaSocial Media, eMail & “Cell” Comms
– Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages
– Check, Track & Locate MobileMobile Communications
40
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
– Check, Track & Locate MobileMobile Communications
– Track “Bad Guys” in National Transport HubsTransport Hubs
–– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets”
– Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking
...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive
Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
Cyber Criminal TeamCyber Criminal Team SkillsetSkillset!...!...
• Skills required by the “Bad Guys”“Bad Guys” to launch
and manage major Cyber Crime Campaigns:
•• ICT:ICT: Cyber Technical Specialist (Hacking Tools)
•• Finance:Finance: Money Laundering & Campaign Budget
•• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent!
41
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent!
•• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt
•• Project Management:Project Management: Co-ordinate Campaign!
•• Security:Security: Detect “BackDoors” both in the Physical
and Cyber Defences of the Target Business/Govt
...In summary, the “Bad Guys”“Bad Guys” will often organise
themselves as an Criminal Cell or Illegal BusinessCriminal Cell or Illegal Business!
Hierarchy ofHierarchy of Cyber Hacking Skills!Cyber Hacking Skills!
42
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“Dark Web”“Dark Web” CriminalCriminal CyberCyber EconomyEconomy
--“Bad Guys”“Bad Guys” Rent/BuyRent/Buy Tools & ResourcesTools & Resources!! --
43
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference 4
3
...Already...Already Criminalised & CommercialisedCriminalised & Commercialised more than 10 Years ago!more than 10 Years ago!
“CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works!
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
44
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
Classic CampaignsClassic Campaigns: Battle of Waterloo: Battle of Waterloo--18151815
45
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“Clausewitz”“Clausewitz” 1919ththCC Physical StrategiesPhysical Strategies remain relevant for 21remain relevant for 21ststCC Cyber Campaigns !Cyber Campaigns !
“Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805
46
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!...
...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812
47
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns!
21stC21stC Cyber WarCyber War && Peace!Peace!
2121ststC Warfare:C Warfare: “Urban Terrorism”“Urban Terrorism”
DefenceDefence againstagainst “Urban Terror”“Urban Terror” needsneeds
INTEGRATIONINTEGRATION ofof PHYSICALPHYSICAL && CYBERCYBER
Security Solutions =Security Solutions = SMART SECURITYSMART SECURITY
“Bad Guys”“Bad Guys” useuse Cyber ToolsCyber Tools
& Resources to extensively& Resources to extensively
ResearchResearch && LaunchLaunch MajorMajor
Physical Terror Attacks!Physical Terror Attacks!
48
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Physical Terror Attacks!Physical Terror Attacks!
(1)(1) DarkWebDarkWeb forfor Weapons!Weapons!
(2)(2) ResearchResearch Urban TargetsUrban Targets
(3)(3) Social MediaSocial Media forfor CommsComms
(4)(4) RecruitmentRecruitment & Training& Training
(5)(5) RansomwareRansomware for CAfor CA$$H..H..
1 – “TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
49
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference49
44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
1 – “TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools
“Exploration”“Exploration”
50
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference50
44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!“Exploration”“Exploration”
“Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools
*** EXPLORATION ****** EXPLORATION ***
• Cyber Crime Campaigns will be launched with
In-depth Cyber & Insider Target ExplorationExploration:
•• Threat 1: APTThreat 1: APT = Advanced Persistent Attack
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
51
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
•• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing
........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor
detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in
preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
Phishing Attack: TypicalPhishing Attack: Typical “Cyber Hacking”“Cyber Hacking” ProcessProcess
52
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Cyber Threats:Cyber Threats: “Fake” Profiles & Toxic“Fake” Profiles & Toxic eMaileMail
53
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Cyber Threats:Cyber Threats: Spyware & Password HacksSpyware & Password Hacks
54
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Cyber Threats:Cyber Threats: KeyloggersKeyloggers -- Hardware & SoftwareHardware & Software
• Easily inserted by CyberCriminal “Insiders”!
• Wi-Fi Scanners & Loggers also Easily Acquired
• Alternative Software Keyloggers can be illegally
downloaded into compromised servers & PCs
55
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
downloaded into compromised servers & PCs
• Logged files can be uploaded to CyberCriminals
through eMail or by FTP through Open Ports
• Examples have also been found inside credit card terminals, pre-
installed by criminals in production plants with SIM Cards and Phone.
5
5
1 -“TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
56
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference56
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
55 ––Cyber Entry & Exit Routes &ToolsCyber Entry & Exit Routes &Tools
““Penetration”Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 - In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
1 -“TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
55 –– Cyber Entry & Exit Routes &ToolsCyber Entry & Exit Routes &Tools
“Penetration”“Penetration”
57
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference57
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
55 ––Cyber Entry & Exit Routes &ToolsCyber Entry & Exit Routes &Tools
““Penetration”Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 - In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
55 –– Cyber Entry & Exit Routes &ToolsCyber Entry & Exit Routes &Tools
“Penetration”“Penetration”
“Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools”
*** PENETRATION ****** PENETRATION ***
• The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business 0or
Agency for both “Entry” & “Exit” Routes for “Data/Bots”:
•• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration
with SQL DB Injection & Web Cross-Site Scripting (XSS)
58
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
with SQL DB Injection & Web Cross-Site Scripting (XSS)
•• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans
•• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches
•• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style”
...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT
WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
Typical C2Typical C2
MalwareMalware
SignaturesSignatures
59
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
SignaturesSignatures
Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
“Cyber Threat”:“Cyber Threat”: SQL Injection VulnerabilitySQL Injection Vulnerability
“Website”
“Website”
60
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“Website”
SolutionSolution: Ensure allEnsure all SQLSQL Inputs areInputs are “Non“Non--EXECUTABLE”EXECUTABLE” ParameterisedParameterised Statements!...Statements!...
Cyber Threats:Cyber Threats: “Twitter”“Twitter” CrossCross--Site Scripting VulnerabilitySite Scripting Vulnerability
61
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference 6
1
Impact ofImpact of XSSXSS CrossCross--Site ScriptingSite Scripting “Cyber Threat”“Cyber Threat”
Solution:Solution:
62
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference 6
2
Solution:Solution: Always check rigorouslyAlways check rigorously
for data fields that allow userfor data fields that allow user--input.input.
Ensure that there is no possibility forEnsure that there is no possibility for
User ScriptUser Script input to be executed ininput to be executed in
website codedwebsite coded ““phpphp”” oror “asp”“asp” pagespages
CrossCross--Site ScriptingSite Scripting Threat by Proxy :Threat by Proxy : XSSXSS
63
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
DesignerDesigner ““StuxNetStuxNet”” WormWorm -- Industrial “SCADA” SystemsIndustrial “SCADA” Systems
StuxnetStuxnet WormWorm : Discovered: Discovered June 2010June 2010
64
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
SCADASCADA = S= Supervisoryupervisory CControl &ontrol & DDataata AAcquisitioncquisition
-- Mainly for Power Stations & Industrial PlantsMainly for Power Stations & Industrial Plants
1 – “TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
65
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
66 –– RealReal--Time Cyber Alert and Attack!Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
1 – “TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
66 –– RealReal--Time Cyber Alert and Attack!Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
66
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
66 –– RealReal--Time Cyber Alert and Attack!Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
“Cyber Attack”“Cyber Attack”
“Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack””
*** CYBER ATTACK ****** CYBER ATTACK ***
• Following In-Depth Cyber Research & Target
Mapping the “Bad Guys”“Bad Guys” will Launch Attack
Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! :
•• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route
Users to “Fake” or “Toxic” Web & DB Resources
67
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Users to “Fake” or “Toxic” Web & DB Resources
•• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service
executed through “Hired” Networked “BotNets”
•• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on
Device that Encrypts ALL Networked Files with
Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
Typical GlobalTypical Global ““BotnetBotnet”” CyberAttack!CyberAttack!
68
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
TypicalTypical DDOSDDOS ““BotNetBotNet” Attack” Attack
69
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Successive “RealSuccessive “Real--Time”Time”DarkNetDarkNet CyberAttacksCyberAttacks
70
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
DDoSDDoS Mitigation :Mitigation : “Packet Filter”“Packet Filter”
71
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
MitigateMitigate DDoSDDoS Attack:Attack: “Black“Black--Holing”Holing”
72
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
1 – “TOP 10 Cyber Threats & Attacks” 2–Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
73
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
77 ––InIn--Depth:Depth: Security for Critical SectorsSecurity for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
1 – “TOP 10 Cyber Threats & Attacks” 2–Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
77 –– InIn--Depth: Security for Critical SectorsDepth: Security for Critical Sectors
74
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
77 ––InIn--Depth:Depth: Security for Critical SectorsSecurity for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
77 –– InIn--Depth: Security for Critical SectorsDepth: Security for Critical Sectors
DefendingDefending YOURYOUR Nation!...Nation!...
Critical Sectors:Critical Sectors: Cyber Threat ScenariosCyber Threat Scenarios
•• Hybrid CyberHybrid Cyber--Physical Security ThreatsPhysical Security Threats willwill targettarget ALLALL
ofof YOURYOUR Critical Business and Government Sectors!....Critical Business and Government Sectors!....
a)a) Finance & BankingFinance & Banking – ATMs, Fraud, Money Laundering
b)b) Transport & TourismTransport & Tourism – Airports, Metro, Tourist Sights
c)c) Energy & UtilitiesEnergy & Utilities – Nuclear, Chemical & Water Resources
d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military
75
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military
e)e) Education & ResearchEducation & Research – Campus-Wide Armed Attacks
f)f) Industry & ManufacturingIndustry & Manufacturing – Competitive Espionage
g)g) Retail, Sports & CultureRetail, Sports & Culture – Malls, Concerts, Olympics.....
........CSOsCSOs are advised toare advised to URGENTLYURGENTLY define practicaldefine practical
& effective action plans to mitigate such attacks!...& effective action plans to mitigate such attacks!...
CybersecurityCybersecurity for Critical Sector Networks:for Critical Sector Networks: “Internet of Things”“Internet of Things”
Sensor Networks
76
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Only 73 Nations (38%)Only 73 Nations (38%)
77
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Only 73 Nations (38%)Only 73 Nations (38%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
UN/ITU GCAUN/ITU GCA -- GlobalGlobal
Cybersecurity Agenda:Cybersecurity Agenda:
----------------------------------------
11 –– Legal MeasuresLegal Measures
22 –– Technical MeasuresTechnical Measures
33 –– Organisational MeasuresOrganisational Measures
44 –– Capacity BuildingCapacity Building
UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda
78
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
44 –– Capacity BuildingCapacity Building
55 –– International CooperationInternational Cooperation
----------------------------------------
...The...The ITUITU constitutes aconstitutes a uniqueunique
global forumglobal forum for partnership andfor partnership and
the discussion ofthe discussion of cybersecurity.cybersecurity.
--------------------------------------
www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies
79
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
United Nations/ITUUnited Nations/ITU CybersecurityCybersecurity GuidesGuides
80
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
-- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda --
Quest forQuest for CyberConfidenceCyberConfidence (Eng/(Eng/RusRus))
81
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
LinkLink: www.itu.int/en/publications/
EU Agency for Info Security:EU Agency for Info Security: ENISAENISA
ENISAENISA Strategic Security FrameworkStrategic Security Framework
Provides effectiveProvides effective “Cyber”“Cyber” model formodel for
NationalNational GovernmentsGovernments & Ministries& Ministries
82
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
-- ALL EU CountriesALL EU Countries now have approvednow have approved National Cybersecurity StrategiesNational Cybersecurity Strategies --
www.enisa.europa.eu/topics/nationalwww.enisa.europa.eu/topics/national--cybercyber--securitysecurity--strategies/ncssstrategies/ncss--mapmap
BET365:BET365: Gambling Sector adoptsGambling Sector adopts
ISO/IEC 27001ISO/IEC 27001 Security StandardsSecurity Standards
• London 5 April 2017- BET365’SBET365’S commitment to
standards recognised with ISO/IEC 27001:2013ISO/IEC 27001:2013
Certification for Info Security Management (ISMS).
• UTECH Jamaica PhD - CyberSecurity & GamblingCyberSecurity & Gambling:
““Cybercrime in Online Gaming & Gambling”:Cybercrime in Online Gaming & Gambling”: An
83
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
““Cybercrime in Online Gaming & Gambling”:Cybercrime in Online Gaming & Gambling”: An
Implementation Framework for Developing Countries -
A Case Study for the Jamaica Jurisdiction: George Brown...
.....Research Programme initiated following.....Research Programme initiated following UN/ITUUN/ITU
CyberSecurity TrainingCyberSecurity Training @@ UTECHUTECH –– September 2010....September 2010....
Cyber ToolCyber Tool: Web: Web--Site SecuritySite Security -- AcunetixAcunetix
84
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Cyber ToolCyber Tool: Web: Web--Site SecuritySite Security -- AcunetixAcunetix
85
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Cyber ToolCyber Tool: Web: Web--Site SecuritySite Security -- AcunetixAcunetix
86
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“Smart Security” for Critical Sectors:“Smart Security” for Critical Sectors:
YOURYOUR Shopping and To Do List!Shopping and To Do List!
•• Security Audit:Security Audit: In-Depth Security Audit and Action Report - Spanning BOTH
Physical and Cybersecurity Operations, Assets and Technologies
•• International Standards:International Standards: Understand and Implement Security Policies and
Programmes to International Standards – ISO/IEC, UN/ITU, IEEE, NIST, ASIS, ISF
•• Training:Training: Professional Training: Form strategic partnerships with leading
educational & research institutions to develop pipeline of professional
graduations in cybersecurity & integrated security technologies
87
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
graduations in cybersecurity & integrated security technologies
•• CERT/CSIRTs:CERT/CSIRTs: Understand the critical role of Cybersecurity CERTs and link their
alerts and operational processes within your overall security policies
•• Security AssociationsSecurity Associations: Join Security Associations and follow developments in
Cybersecurity for ““Intelligent RealIntelligent Real--Time Systems”Time Systems” & “Internet of Things”“Internet of Things”
........YOURYOUR Top Priority is ProfessionalTop Priority is Professional Cybersecurity Training & CertificationCybersecurity Training & Certification withwith
regular courseregular course “Top“Top--Ups”Ups” since the field is moving atsince the field is moving at Supersonic SpeedSupersonic Speed!!
1 – “TOP 10 Cyber Threats & Attacks” 2–Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 –Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
88
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 –Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 88 –– YOURYOUR Operational Cyber Defence!Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
1 – “TOP 10 Cyber Threats & Attacks” 2–Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 –Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
88 –– YOURYOUR Operational Cyber Defence!Operational Cyber Defence!
“Budget, Training & Plan!”“Budget, Training & Plan!”
89
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 –Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: Security for Critical Sectors 88 –– YOURYOUR Operational Cyber Defence!Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
88 –– YOURYOUR Operational Cyber Defence!Operational Cyber Defence!
“Budget, Training & Plan!”“Budget, Training & Plan!”
““YOURYOUR Cyber CampaignCyber Campaign Action PlanAction Plan””
• Defeating the “Bad Guys”“Bad Guys” requires YOU to Launch a
Campaign Action Plan for Active Cyber Defence!
• Fighting the TOP 10 Cyber ThreatsTOP 10 Cyber Threats requires:
––C$O:C$O: Board Level Security Plan and $ Investment
90
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
––C$O:C$O: Board Level Security Plan and $ Investment
––Technical:Technical: Professional Team, Tools & Training
––Operational:Operational: Security, Standards & Compliance
........CyberSecurityCyberSecurity is Continuously Evolving so keep upis Continuously Evolving so keep up
withwith Conferences & Professional MembershipsConferences & Professional Memberships!....!....
“In“In--Depth 21stC TechnicalDepth 21stC Technical Cyber DefenceCyber Defence””
• Effective Cyber Defence to TOP 10 Threats
requires BOTH Technical & Operational Plans:
• Technical Actions, Plans & Policies include:
–– DataBaseDataBase:: Secure Physical & Cloud DataBase Scripts
–– BackBack--Ups:Ups: Continuous Real-Time DB/Web Back-Ups
–– BYOD:BYOD: Strict Policy for “Bring Your Own Device”
91
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
–– BYOD:BYOD: Strict Policy for “Bring Your Own Device”
–– eMaileMail:: Script Locks on eMail Attachments & Web Links
–– DDoS:DDoS: Switch DNS/IP Settings in case of DDoS Attack
–– CERT:CERT: Set-Up Computer Emergency Response Team
............CERTsCERTs work togetherwork together GloballyGlobally to provideto provide
Cyber Alerts & IntelligenceCyber Alerts & Intelligence to Govt & Businessto Govt & Business
““YOURYOUR OperationalOperational Cyber DefenceCyber Defence””
•• CC$$O:O: Board Level Role – Chief $ecurity Officer - with
Security Investment Plan and $$$ Budget!..
•• Cyber Standards:Cyber Standards: Migrate to International Security
Standards such as ISO2700x Series
•• Compliance:Compliance: Implement regular IT Asset & Process
Audits to ensure Full Compliance
•• Training:Training: Ensure Key Staff are Professionally Certified
92
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
•• Training:Training: Ensure Key Staff are Professionally Certified
(CISSP) with Bi-Annual Updates.
•• Culture:Culture: Launch Business/Agency Security Policy so ALLALL
Staff understand their Responsibilities!
....A Major Targeted....A Major Targeted Cyber AttackCyber Attack can easily destroycan easily destroy YOURYOUR
BusinessBusiness as effectively as Bankruptcy soas effectively as Bankruptcy so Plan & InvestPlan & Invest!!
Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST
Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017
NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology
93
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
NISTNIST CybersecurityCybersecurity FrameworkFramework
National Institute of Standards & TechnologyNational Institute of Standards & Technology
94
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
1 – “TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
95
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7–In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 99 –– YOURYOUR Cyber Campaign Action Plan!Cyber Campaign Action Plan!
1 – “TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
99 –– YOURYOUR Cyber Campaign Action Plan!Cyber Campaign Action Plan!
CSOCSO -- Cyber Leadership!Cyber Leadership!
96
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert and Attack!
“Cyber Attack”“Cyber Attack”
7–In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 99 –– YOURYOUR Cyber Campaign Action Plan!Cyber Campaign Action Plan!CSOCSO -- Cyber Leadership!Cyber Leadership!
WrapWrap--Up:Up: CyberSecurityCyberSecurity LandscapeLandscape
•• Convergence of Physical & Cybersecurity OperationsConvergence of Physical & Cybersecurity Operations
•• “Cyber” migrates from IT Dept to Main Board: C“Cyber” migrates from IT Dept to Main Board: C--SuiteSuite
•• Global RealGlobal Real--Time Targeted Cyber AttacksTime Targeted Cyber Attacks –– 24/724/7
•• Transition from 20Transition from 20ththC Tools (Firewalls & AntiC Tools (Firewalls & Anti--virus) tovirus) to
“Smart” 21“Smart” 21ststC Tools (AI & Machine Learning)C Tools (AI & Machine Learning)
97
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
“Smart” 21“Smart” 21ststC Tools (AI & Machine Learning)C Tools (AI & Machine Learning)
•• Emergence of Enterprise “Internet of Things”Emergence of Enterprise “Internet of Things”
•• Evolution of Smart Devices, Cities, Economy & SocietyEvolution of Smart Devices, Cities, Economy & Society
•• Dramatic increase in Cyber Crime & Cyber TerrorismDramatic increase in Cyber Crime & Cyber Terrorism
Now Design & ImplementNow Design & Implement YOURYOUR Business Plan for 21Business Plan for 21ststCC “Cyber”!...“Cyber”!...
YOURYOUR Action Plan forAction Plan for 21stC Cyber21stC Cyber!...!...
• Every CSO needs Board-Level Approval for Annual
Security Business Plan that includes CyberSecurity
• YOUR CyberSecurity Plan ActionsOUR CyberSecurity Plan Actions will include:
–– Investment BudgetInvestment Budget for Integrated Security Solutions
–– Job SpecificationsJob Specifications for Professional “Cyber” Team
–– Security Staff TrainingSecurity Staff Training & Professional Development
98
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
–– Security Staff TrainingSecurity Staff Training & Professional Development
–– Technical & OperationalTechnical & Operational Plans & Upgrades
–– Actions for ComplianceActions for Compliance, Security Audit & ISO Standards
.....Invest & Equip.....Invest & Equip YOURYOUR Business withBusiness with 21stC21stC CyberDefenceCyberDefence
Download Presentation @Download Presentation @ www.valentina.net/Seville2017/www.valentina.net/Seville2017/
“Cyber Defence”“Cyber Defence” againstagainst “Alien Invaders”“Alien Invaders”
A.I. & Machine LearningA.I. & Machine Learning
CyberSecurity Tools willCyberSecurity Tools will
99
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
CyberSecurity Tools willCyberSecurity Tools will
ProvideProvide “Speed of Light”“Speed of Light”
RealReal--Time Defence againstTime Defence against
TOP 10TOP 10 Threats & Attacks!Threats & Attacks!
“Steam Powered Birds arrive over our Cities! - 1981
Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
3636thth East/West Security Conference:East/West Security Conference: Seville, SpainSeville, Spain
100
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ThankThank--You!You!ThankThank--You!You!
CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security
3636thth East/West Security Conference:East/West Security Conference: Seville, SpainSeville, Spain
101
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
ThankThank--You!You!ThankThank--You!You!
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/www.Valentina.net/Seville2017Seville2017//
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/www.Valentina.net/Seville2017Seville2017//
EastEast--West Security Conference: Seville 2017West Security Conference: Seville 2017
-- “Cyber Futures & Defence”“Cyber Futures & Defence” :: OnOn--Line!Line!
102
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Download Link:Download Link: www.valentina.net/Seville2017/www.valentina.net/Seville2017/
Theme (1):Theme (1): Security Futures:Security Futures:20182018--20252025 Theme (2):Theme (2): Cyber Threats & DefenceCyber Threats & Defence
Download Presentation Slides:Download Presentation Slides:
www.Valentina.netwww.Valentina.net/Seville2017//Seville2017/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.netwww.Valentina.net/Seville2017//Seville2017/
103
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
104
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
105
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree
(Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
Cyber Threats & DefenceCyber Threats & Defence:: Intelligent SecurityIntelligent Security
3636thth East/West Security Conference:East/West Security Conference: Seville, SpainSeville, Spain
106
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
107
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
108
-- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! --
“Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity”
Seville, Spain, 20th – 21st November2017
© Dr David E. Probert : www.VAZA.com ©
3636thth International East West Security ConferenceInternational East West Security Conference
Link:Link: www.bt.com/rethinkingwww.bt.com/rethinking--thethe--riskrisk
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!

Más contenido relacionado

La actualidad más candente

21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsDr David Probert
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceDr David Probert
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 

La actualidad más candente (20)

21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 

Similar a Cyber Threats & Defence! - "Intelligent CyberSecurity"!

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Dr David Probert
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziNCCOMMS
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017Saumil Shah
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdfdarg0001
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSSylvain Martinez
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY HilalHarris
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016ITnation Luxembourg
 
99 best cyber security podcasts for beginners
99 best cyber security podcasts for beginners 99 best cyber security podcasts for beginners
99 best cyber security podcasts for beginners Infosec Reporter
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbersEoin Keary
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 

Similar a Cyber Threats & Defence! - "Intelligent CyberSecurity"! (14)

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdf
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
 
99 best cyber security podcasts for beginners
99 best cyber security podcasts for beginners 99 best cyber security podcasts for beginners
99 best cyber security podcasts for beginners
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 

Más de Dr David Probert

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseDr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic BusinessDr David Probert
 

Más de Dr David Probert (8)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cyber Threats & Defence! - "Intelligent CyberSecurity"!

  • 1. CyberCyber Threats & Defence!Threats & Defence! -- “Intelligent CyberSecurity”“Intelligent CyberSecurity”-- 1 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference -- “Intelligent CyberSecurity”“Intelligent CyberSecurity”-- Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--DaughtersDaughters –– Tatiana, Alice & AbigailTatiana, Alice & Abigail –– Securing YOUR Life !Securing YOUR Life !
  • 2. КиберКибер Угрозы и ЗащитаУгрозы и Защита УУмный КиберБезопасностьмный КиберБезопасность 2 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference УУмный КиберБезопасностьмный КиберБезопасность Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational
  • 3. CyberCyber Futures & Defence:Futures & Defence: “Dual Themes”“Dual Themes” Theme (1)”Theme (1)” -- “Security Futures:“Security Futures: 20182018--2025+2025+” :” : TTechnology,echnology, TTools andools and TTrends...rends... -- Bringing CyberSecurity toBringing CyberSecurity to YOURYOUR Board Room with Budget & Mission!Board Room with Budget & Mission! -- FutureFuture CyberCyber--ScenariosScenarios for Integrated, Adaptive, Intelligent Security!for Integrated, Adaptive, Intelligent Security! -- New CyberSecurity Toolkits to DefendNew CyberSecurity Toolkits to Defend YOURYOUR Business Operations!Business Operations! ““ CyberVision: Machine Learning, AI & Neural Security“CyberVision: Machine Learning, AI & Neural Security“ 2121stst Nov: 09:40Nov: 09:40–– 10:2010:20 3 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ThemeTheme (2)(2) –– “Cyber Threats & Defence”:“Cyber Threats & Defence”: Intelligent CyberSecurity for OUR 21Intelligent CyberSecurity for OUR 21stst C...C... -- TOP 10 CyberThreatsTOP 10 CyberThreats: Exploration, Penetration and Attack!: Exploration, Penetration and Attack! -- RecentRecent Case StudiesCase Studies of Cyber Crime, Terror & Political Attacks!of Cyber Crime, Terror & Political Attacks! -- DevelopingDeveloping YOURYOUR Action Plans & Cybersecurity Programme!Action Plans & Cybersecurity Programme! ““CyberDefenceCyberDefence: Real: Real--Time Learning, Detection & Alerts”Time Learning, Detection & Alerts” 2121stst Nov: 14:30Nov: 14:30 –– 15:1015:10 Download SlideDownload Slides:s: www.valentina.net/Seville2017/www.valentina.net/Seville2017/
  • 4. Topics suggestedTopics suggested @@ GenoaGenoa –– June 2017June 2017 1.1. CyberCrime &CyberCrime & CyberTerrorCyberTerror: Who is the Enemy?: Who is the Enemy? 2.2. EffectiveEffective InfoSecInfoSec:: Boardroom Responsibility(CSO)Boardroom Responsibility(CSO) 3.3. Virus Threat! :Virus Threat! : Aware GlobalAware Global -- Protect Local !Protect Local ! 4.4. CyberSecurity in the Financial Services SectorCyberSecurity in the Financial Services Sector 5.5. Security Strategies for Corporate NetworksSecurity Strategies for Corporate Networks 4 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 5.5. Security Strategies for Corporate NetworksSecurity Strategies for Corporate Networks 6.6. Threats to IT Infrastructure & Countermeasures!Threats to IT Infrastructure & Countermeasures! 7.7. Effective IT Security:Effective IT Security: Prevent & Adapt to ThreatsPrevent & Adapt to Threats ......We’ll respond to......We’ll respond to ALLALL these during this talk onthese during this talk on “Cyber Threats & Defence”:“Cyber Threats & Defence”: Intelligent SecurityIntelligent Security
  • 5. 11 ––“TOP 10 Cyber Threats & Attacks”“TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns! 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6–Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 5 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6–Real-Time Cyber Alert and Attack! “Cyber Attack!”“Cyber Attack!” 7 –In-Depth: Security for Critical Sectors 8– YOURYOUR Operational Cyber Defence 9 –YOURYOUR Cyber Campaign Action Plan!
  • 6. 11 ––“TOP 10 Cyber Threats & Attacks”“TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns! 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6–Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 11 ––“TOP 10 Cyber Threats & Attacks!”“TOP 10 Cyber Threats & Attacks!” CyberCyberCrimeCrime –– CyberCyberTerrorTerror –– CyberCyberWarWar 6 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6–Real-Time Cyber Alert and Attack! “Cyber Attack!”“Cyber Attack!” 7 –In-Depth: Security for Critical Sectors 8– YOURYOUR Operational Cyber Defence 9 –YOURYOUR Cyber Campaign Action Plan! CyberCyberCrimeCrime –– CyberCyberTerrorTerror –– CyberCyberWarWar
  • 7. ““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar”” 1)1) Media:Media: Global News Reports of Cyber Attacks! 2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats, & Mechanisms exploited by “Bad Guys”! 3)3) Cyber Reality:Cyber Reality: Understand the Criminal & Political Reality behind Cyber Attacks! 7 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Political Reality behind Cyber Attacks! 4)4) Practical Defence:Practical Defence: Discuss Practical Cyber Defence to these Threats for YOUR Business! .....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
  • 8. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 8 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 9. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 9 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 10. Red Alert!Red Alert! World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 10 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! --
  • 11. Red Alert!Red Alert! World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 11 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! -- “BAD RABBIT”“BAD RABBIT” RansomwareRansomware AttackAttack –– 2424thth Oct 2017Oct 2017
  • 12. “Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!” •• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by Role during Criminal/Political Cyber Campaign: ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack •• Cyber AttacksCyber Attacks may be planned by Criminals, 12 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Cyber AttacksCyber Attacks may be planned by Criminals, Terrorists & Hacktivists for weeks & months! •• Research & Intelligence:Research & Intelligence: Major Attacks will be based on In-Depth Research, “Insider Intelligence”, and Cyber “Hackers” Toolkit!...
  • 13. RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack 13 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
  • 14. Guide toGuide to Cyber ScamsCyber Scams: March 2017: March 2017 Recommended!Recommended! 14 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference https://beta.met.police.uk/globalassets/downloads/fraud/thehttps://beta.met.police.uk/globalassets/downloads/fraud/the--littlelittle--bookbook--cybercyber--scams.pdfscams.pdf Recommended!Recommended!
  • 15. 1 –“TOP 10 Cyber Threats & Attacks” 22 ––CyberCyber Case Studies: Recent AttacksCase Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns! 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 15 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 –YOURYOUR Cyber Campaign Action Plan!
  • 16. 1 –“TOP 10 Cyber Threats & Attacks” 22 ––CyberCyber Case Studies: Recent AttacksCase Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns! 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 22 ––Cyber Case Studies: Recent AttacksCyber Case Studies: Recent Attacks RansomwareRansomware & ID Theft!...& ID Theft!... 16 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 –YOURYOUR Cyber Campaign Action Plan! RansomwareRansomware & ID Theft!...& ID Theft!...
  • 17. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 17 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 18. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 18 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 19. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 19 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 20. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 20 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 21. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 21 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 22. Massive HackMassive Hack –– EQUIFAXEQUIFAX -- Sept 2017Sept 2017 22 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Personal IDs Stolen fromPersonal IDs Stolen from 144Million+144Million+ Clients (USA, UK...)Clients (USA, UK...) ....Credit Cards, Driving Licences, Social Security,....Credit Cards, Driving Licences, Social Security, eMaileMail........
  • 23. CyberCrime:CyberCrime: Russian Financial ServicesRussian Financial Services 6+ Russian Banks “Hacked” as6+ Russian Banks “Hacked” as well as other target CIS Bankswell as other target CIS Banks Press Report: TASS News AgencyPress Report: TASS News Agency -- 11stst June 2016June 2016 -- 23 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference well as other target CIS Bankswell as other target CIS Banks Trojan “Lurk” Malware ToolkitTrojan “Lurk” Malware Toolkit At least 1.7Bn Roubles StolenAt least 1.7Bn Roubles Stolen 50 “Cyber Hackers” Arrested50 “Cyber Hackers” Arrested Digital Forensics executed byDigital Forensics executed by KasperskyKaspersky Labs, FSB andLabs, FSB and SberbankSberbank
  • 24. Malware Attack:Malware Attack: SWIFTSWIFT Bank NetBank Net –– 20162016 Cyber Analysis by BAE SystemsCyber Analysis by BAE Systems 24 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Multiple Cyber Attacks including Cyber Heist ofMultiple Cyber Attacks including Cyber Heist of $951M$951M fromfrom Bangladesh Central BankBangladesh Central Bank of whichof which $81M$81M remains missing!remains missing!
  • 25. Malware Attack:Malware Attack: SWIFTSWIFT Bank NetBank Net –– 20162016 Cyber Analysis by BAE SystemsCyber Analysis by BAE Systems 25 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Multiple Cyber Attacks including Cyber Heist ofMultiple Cyber Attacks including Cyber Heist of $951M$951M fromfrom Bangladesh Central BankBangladesh Central Bank of whichof which $81M$81M remains missing!remains missing!
  • 26. ProjectProject SauronSauron:: CyberEspionageCyberEspionage -- 20162016 Analysed by SymantecAnalysed by Symantec andand KasperskyKaspersky Labs...Labs... -- August 2016August 2016 -- KnownKnown CyberTargetsCyberTargets include: Russia, China,include: Russia, China, Iran, Rwanda, ItalyIran, Rwanda, Italy Sweden & BelgiumSweden & Belgium 26 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference PowerfulPowerful APT MalwareAPT Malware that targetedthat targeted Critical National InfrastructureCritical National Infrastructure:: Top LevelTop Level Government. Military, Telecoms, Finance and R&D CentresGovernment. Military, Telecoms, Finance and R&D Centres Sweden & BelgiumSweden & Belgium OtherOther “State“State--Designed”Designed” Cyber Malware include:Cyber Malware include: StuxnetStuxnet,, DuquDuqu, Flame,, Flame, Equation andEquation and ReginRegin......
  • 27. ProjectProject SauronSauron:: CyberEspionageCyberEspionage -- 20162016 Analysed by SymantecAnalysed by Symantec andand KasperskyKaspersky Labs...Labs... -- August 2016August 2016 -- KnownKnown CyberTargetsCyberTargets include: Russia, China,include: Russia, China, Iran, Rwanda, ItalyIran, Rwanda, Italy Sweden & BelgiumSweden & Belgium 27 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference PowerfulPowerful APT MalwareAPT Malware that targetedthat targeted Critical National InfrastructureCritical National Infrastructure:: Top LevelTop Level Government. Military, Telecoms, Finance and R&D CentresGovernment. Military, Telecoms, Finance and R&D Centres Sweden & BelgiumSweden & Belgium OtherOther “State“State--Designed”Designed” Cyber Malware include:Cyber Malware include: StuxnetStuxnet,, DuquDuqu, Flame,, Flame, Equation andEquation and ReginRegin......
  • 28. CyberEspionageCyberEspionage in Asiain Asia--Pacific RegionPacific Region Attacks fromAttacks from 20122012 onwards byonwards by HellsingHellsing APTAPT Victims were inVictims were in Malaysia, PhilippinesMalaysia, Philippines Indonesia, India, USAIndonesia, India, USA 28 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference onwards byonwards by HellsingHellsing andand NaikonNaikon GroupsGroups Targets ofTargets of APTAPT AttacksAttacks werewere GovernmentGovernment && Diplomatic AgenciesDiplomatic Agencies Analysed byAnalysed by KasperskyKaspersky LabsLabs:: April 2015April 2015
  • 29. MassiveMassive DDoSDDoS Attack usingAttack using MiraiMirai BotNetBotNet fromfrom “Internet of Things”“Internet of Things” -- 2121stst Oct 2016Oct 2016 29 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference More thanMore than 500,000 “IoT”500,000 “IoT” Devices suchDevices such asas CCTVCCTV && Web CamsWeb Cams used asused as “Bots”!...“Bots”!... “Internet of Threats”!“Internet of Threats”!
  • 30. CyberAttack:CyberAttack: Tesco BankTesco Bank –– Nov 2016Nov 2016 30 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 66thth Nov 2016:Nov 2016: Cyber CriminalsCyber Criminals fromfrom Brazil & SpainBrazil & Spain hackhack 40,00040,000 TESCO Bank AccountsTESCO Bank Accounts with reported Theft ofwith reported Theft of £2.5m£2.5m fromfrom 9,0009,000
  • 31. CyberAttack:CyberAttack: SberBankSberBank -- СбербанкСбербанк:: 88thth Nov 2016Nov 2016 31 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference MassiveMassive DDoSDDoS AttackAttack fromfrom 24,000 “24,000 “BotBot” Devices (Internet of Things)” Devices (Internet of Things) HitsHits SberBankSberBank, Alfa Bank, Moscow Bank,, Alfa Bank, Moscow Bank, RosBankRosBank, Moscow Exchange, Moscow Exchange - PeakPeak Web IP Requests of 660,000/Sec660,000/Sec quoted by KasperskyKaspersky LabsLabs -
  • 32. CyberAttack:CyberAttack: SberBankSberBank -- СбербанкСбербанк:: 88thth Nov 2016Nov 2016 32 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference MassiveMassive DDoSDDoS AttackAttack fromfrom 24,000 “24,000 “BotBot” Devices (Internet of Things)” Devices (Internet of Things) HitsHits SberBankSberBank, Alfa Bank, Moscow Bank,, Alfa Bank, Moscow Bank, RosBankRosBank, Moscow Exchange, Moscow Exchange - PeakPeak Web IP Requests of 660,000/Sec660,000/Sec quoted by KasperskyKaspersky LabsLabs -
  • 33. Cyber Threat:Cyber Threat: “Banking Theft”“Banking Theft”–– CarbanakCarbanak 33 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference EstimatedEstimated ~$1Billion~$1Billion stolenstolen fromfrom ~100+~100+ Banks & FinancialBanks & Financial Institutions duringInstitutions during 2013/20142013/2014 Researched by “Researched by “KasperskyKaspersky Labs”Labs”
  • 34. CyberSecurity:CyberSecurity: Market SectorsMarket Sectors •• AntiAnti--Virus/FirewallVirus/Firewall •• ID AuthenticationID Authentication •• Encryption/PrivacyEncryption/Privacy •• Risk & ComplianceRisk & Compliance •• Mobile Device SecurityMobile Device Security •• AI & Machine LearningAI & Machine Learning •• Enterprise IoT SecurityEnterprise IoT Security •• Cloud Security ServicesCloud Security Services •• Big Data ProtectionBig Data Protection •• RT Log/Event AnalyticsRT Log/Event Analytics 34 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Mobile Device SecurityMobile Device Security •• AntiAnti--Fraud MonitoringFraud Monitoring •• Website ProtectionWebsite Protection •• S/W Code VerificationS/W Code Verification •• RT Log/Event AnalyticsRT Log/Event Analytics •• RealReal--Time Threat MapsTime Threat Maps •• Smart BiometricsSmart Biometrics •• Training & CertificationTraining & Certification Global Trend is towardsGlobal Trend is towards Adaptive & Intelligent Cybersecurity Solutions/ServicesAdaptive & Intelligent Cybersecurity Solutions/Services... ....Traditional....Traditional AntiAnti--Virus/Firewall ToolsVirus/Firewall Tools no longer fully effective againstno longer fully effective against “Bad Guys”“Bad Guys”!!
  • 35. 1 –“TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 33 –– Cyber Hack & Attack Campaigns!Cyber Hack & Attack Campaigns! 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 35 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 –YOURYOUR Cyber Campaign Action Plan!
  • 36. 1 –“TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 33 –– Cyber Hack & Attack Campaigns!Cyber Hack & Attack Campaigns! 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 33 –– Cyber Hack & Attack Campaigns!Cyber Hack & Attack Campaigns! ProfessionalProfessional “Bad Guys”!...“Bad Guys”!... 36 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 –YOURYOUR Cyber Campaign Action Plan! ProfessionalProfessional “Bad Guys”!...“Bad Guys”!...
  • 37. “21stC“21stC CyberCyber Hack & AttackHack & Attack CampaignsCampaigns”” •• CyberCrime & TerrorismCyberCrime & Terrorism are now organised on an “Industrial Scale” with Toolkits & BotNets for “Hire by the Hour” on the “DarkWeb”... •• Major Cyber AttacksMajor Cyber Attacks demand the Professional Skills of a well managed Criminal Enterprise... 37 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Skills of a well managed Criminal Enterprise... •• The Cyber EnterpriseThe Cyber Enterprise may be a small CyberCell of 3 or 4 “Staff” and scale up to teams of hundreds in some Cyber Banking “Heists”... .....Next we explore some Cyber Criminal Skills........Next we explore some Cyber Criminal Skills...
  • 38. MainMain CyberCyber Players and their MotivesPlayers and their Motives •• Cyber Criminals:Cyber Criminals: Seeking commercial gain from hacking banks & financial institutions as well a phishing scams & computer ransom ware •• Cyber Terrorists:Cyber Terrorists: Mission to penetrate & attack critical assets, and national infrastructure for aims relating to political power & “branding” •• Cyber Espionage:Cyber Espionage: Using stealthy IT Malware to 38 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Cyber Espionage:Cyber Espionage: Using stealthy IT Malware to penetrate both corporate & military data servers in order to obtain plans & intelligence •• Cyber Hackivists:Cyber Hackivists: Groups such as “Anonymous” with Political Agendas that hack sites & servers to virally communicate the “message” for specific campaigns
  • 39. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages – Check, Track & Locate MobileMobile Communications 39 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference – Check, Track & Locate MobileMobile Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 40. “Cyber”“Cyber” Tracking & ProfilingTracking & Profiling:: “Bad Guys”“Bad Guys” • Mitigating Global Crime & Terrorism requires us to Profile & TrackProfile & Track the “Bad Guys” in “Real-Time” with Intelligent Networked Computing Systems: –– 3D Video Analytics3D Video Analytics from CCTV Facial Profiles – Track On-Line Social MediaSocial Media, eMail & “Cell” Comms – Scan ““DarkNetDarkNet”” for “Business Deals”, Plans & Messages – Check, Track & Locate MobileMobile Communications 40 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference – Check, Track & Locate MobileMobile Communications – Track “Bad Guys” in National Transport HubsTransport Hubs –– DeployDeploy RFID DevicesRFID Devices to Track Highto Track High--Value & Strategic “Assets”Value & Strategic “Assets” – Use RealReal--Time ANPRTime ANPR for Target Vehicle Tracking ...Cyber Computing Smart AppsCyber Computing Smart Apps can now Track Massive Databases of Target “Bad Guy” Profiles @ Light Speed!...@ Light Speed!...
  • 41. Cyber Criminal TeamCyber Criminal Team SkillsetSkillset!...!... • Skills required by the “Bad Guys”“Bad Guys” to launch and manage major Cyber Crime Campaigns: •• ICT:ICT: Cyber Technical Specialist (Hacking Tools) •• Finance:Finance: Money Laundering & Campaign Budget •• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent! 41 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent! •• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt •• Project Management:Project Management: Co-ordinate Campaign! •• Security:Security: Detect “BackDoors” both in the Physical and Cyber Defences of the Target Business/Govt ...In summary, the “Bad Guys”“Bad Guys” will often organise themselves as an Criminal Cell or Illegal BusinessCriminal Cell or Illegal Business!
  • 42. Hierarchy ofHierarchy of Cyber Hacking Skills!Cyber Hacking Skills! 42 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 43. “Dark Web”“Dark Web” CriminalCriminal CyberCyber EconomyEconomy --“Bad Guys”“Bad Guys” Rent/BuyRent/Buy Tools & ResourcesTools & Resources!! -- 43 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 3 ...Already...Already Criminalised & CommercialisedCriminalised & Commercialised more than 10 Years ago!more than 10 Years ago!
  • 44. “CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works! RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor 44 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity! forfor CybersecurityCybersecurity Specialists!Specialists! forfor CybersecurityCybersecurity Specialists!Specialists! Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
  • 45. Classic CampaignsClassic Campaigns: Battle of Waterloo: Battle of Waterloo--18151815 45 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference “Clausewitz”“Clausewitz” 1919ththCC Physical StrategiesPhysical Strategies remain relevant for 21remain relevant for 21ststCC Cyber Campaigns !Cyber Campaigns !
  • 46. “Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805 46 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!... ...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
  • 47. Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812 47 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference “Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns! 21stC21stC Cyber WarCyber War && Peace!Peace!
  • 48. 2121ststC Warfare:C Warfare: “Urban Terrorism”“Urban Terrorism” DefenceDefence againstagainst “Urban Terror”“Urban Terror” needsneeds INTEGRATIONINTEGRATION ofof PHYSICALPHYSICAL && CYBERCYBER Security Solutions =Security Solutions = SMART SECURITYSMART SECURITY “Bad Guys”“Bad Guys” useuse Cyber ToolsCyber Tools & Resources to extensively& Resources to extensively ResearchResearch && LaunchLaunch MajorMajor Physical Terror Attacks!Physical Terror Attacks! 48 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Physical Terror Attacks!Physical Terror Attacks! (1)(1) DarkWebDarkWeb forfor Weapons!Weapons! (2)(2) ResearchResearch Urban TargetsUrban Targets (3)(3) Social MediaSocial Media forfor CommsComms (4)(4) RecruitmentRecruitment & Training& Training (5)(5) RansomwareRansomware for CAfor CA$$H..H..
  • 49. 1 – “TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns 44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 49 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference49 44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
  • 50. 1 – “TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns 44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools “Exploration”“Exploration” 50 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference50 44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!“Exploration”“Exploration”
  • 51. “Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools *** EXPLORATION ****** EXPLORATION *** • Cyber Crime Campaigns will be launched with In-depth Cyber & Insider Target ExplorationExploration: •• Threat 1: APTThreat 1: APT = Advanced Persistent Attack •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams 51 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams •• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing ........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
  • 52. Phishing Attack: TypicalPhishing Attack: Typical “Cyber Hacking”“Cyber Hacking” ProcessProcess 52 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 53. Cyber Threats:Cyber Threats: “Fake” Profiles & Toxic“Fake” Profiles & Toxic eMaileMail 53 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 54. Cyber Threats:Cyber Threats: Spyware & Password HacksSpyware & Password Hacks 54 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 55. Cyber Threats:Cyber Threats: KeyloggersKeyloggers -- Hardware & SoftwareHardware & Software • Easily inserted by CyberCriminal “Insiders”! • Wi-Fi Scanners & Loggers also Easily Acquired • Alternative Software Keyloggers can be illegally downloaded into compromised servers & PCs 55 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference downloaded into compromised servers & PCs • Logged files can be uploaded to CyberCriminals through eMail or by FTP through Open Ports • Examples have also been found inside credit card terminals, pre- installed by criminals in production plants with SIM Cards and Phone. 5 5
  • 56. 1 -“TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 56 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference56 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 55 ––Cyber Entry & Exit Routes &ToolsCyber Entry & Exit Routes &Tools ““Penetration”Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 - In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
  • 57. 1 -“TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 55 –– Cyber Entry & Exit Routes &ToolsCyber Entry & Exit Routes &Tools “Penetration”“Penetration” 57 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference57 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 55 ––Cyber Entry & Exit Routes &ToolsCyber Entry & Exit Routes &Tools ““Penetration”Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 - In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan! 55 –– Cyber Entry & Exit Routes &ToolsCyber Entry & Exit Routes &Tools “Penetration”“Penetration”
  • 58. “Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools” *** PENETRATION ****** PENETRATION *** • The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business 0or Agency for both “Entry” & “Exit” Routes for “Data/Bots”: •• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration with SQL DB Injection & Web Cross-Site Scripting (XSS) 58 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference with SQL DB Injection & Web Cross-Site Scripting (XSS) •• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans •• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches •• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style” ...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
  • 59. Typical C2Typical C2 MalwareMalware SignaturesSignatures 59 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference SignaturesSignatures Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
  • 60. “Cyber Threat”:“Cyber Threat”: SQL Injection VulnerabilitySQL Injection Vulnerability “Website” “Website” 60 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference “Website” SolutionSolution: Ensure allEnsure all SQLSQL Inputs areInputs are “Non“Non--EXECUTABLE”EXECUTABLE” ParameterisedParameterised Statements!...Statements!...
  • 61. Cyber Threats:Cyber Threats: “Twitter”“Twitter” CrossCross--Site Scripting VulnerabilitySite Scripting Vulnerability 61 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 6 1
  • 62. Impact ofImpact of XSSXSS CrossCross--Site ScriptingSite Scripting “Cyber Threat”“Cyber Threat” Solution:Solution: 62 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 6 2 Solution:Solution: Always check rigorouslyAlways check rigorously for data fields that allow userfor data fields that allow user--input.input. Ensure that there is no possibility forEnsure that there is no possibility for User ScriptUser Script input to be executed ininput to be executed in website codedwebsite coded ““phpphp”” oror “asp”“asp” pagespages
  • 63. CrossCross--Site ScriptingSite Scripting Threat by Proxy :Threat by Proxy : XSSXSS 63 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 64. DesignerDesigner ““StuxNetStuxNet”” WormWorm -- Industrial “SCADA” SystemsIndustrial “SCADA” Systems StuxnetStuxnet WormWorm : Discovered: Discovered June 2010June 2010 64 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference SCADASCADA = S= Supervisoryupervisory CControl &ontrol & DDataata AAcquisitioncquisition -- Mainly for Power Stations & Industrial PlantsMainly for Power Stations & Industrial Plants
  • 65. 1 – “TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 65 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 66 –– RealReal--Time Cyber Alert and Attack!Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
  • 66. 1 – “TOP 10 Cyber Threats & Attacks” 2 –Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 66 –– RealReal--Time Cyber Alert and Attack!Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 66 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 66 –– RealReal--Time Cyber Alert and Attack!Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan! “Cyber Attack”“Cyber Attack”
  • 67. “Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack”” *** CYBER ATTACK ****** CYBER ATTACK *** • Following In-Depth Cyber Research & Target Mapping the “Bad Guys”“Bad Guys” will Launch Attack Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! : •• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route Users to “Fake” or “Toxic” Web & DB Resources 67 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Users to “Fake” or “Toxic” Web & DB Resources •• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service executed through “Hired” Networked “BotNets” •• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on Device that Encrypts ALL Networked Files with Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
  • 68. Typical GlobalTypical Global ““BotnetBotnet”” CyberAttack!CyberAttack! 68 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 69. TypicalTypical DDOSDDOS ““BotNetBotNet” Attack” Attack 69 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 70. Successive “RealSuccessive “Real--Time”Time”DarkNetDarkNet CyberAttacksCyberAttacks 70 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
  • 71. DDoSDDoS Mitigation :Mitigation : “Packet Filter”“Packet Filter” 71 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 72. MitigateMitigate DDoSDDoS Attack:Attack: “Black“Black--Holing”Holing” 72 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 73. 1 – “TOP 10 Cyber Threats & Attacks” 2–Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 73 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 77 ––InIn--Depth:Depth: Security for Critical SectorsSecurity for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
  • 74. 1 – “TOP 10 Cyber Threats & Attacks” 2–Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 77 –– InIn--Depth: Security for Critical SectorsDepth: Security for Critical Sectors 74 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 77 ––InIn--Depth:Depth: Security for Critical SectorsSecurity for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan! 77 –– InIn--Depth: Security for Critical SectorsDepth: Security for Critical Sectors DefendingDefending YOURYOUR Nation!...Nation!...
  • 75. Critical Sectors:Critical Sectors: Cyber Threat ScenariosCyber Threat Scenarios •• Hybrid CyberHybrid Cyber--Physical Security ThreatsPhysical Security Threats willwill targettarget ALLALL ofof YOURYOUR Critical Business and Government Sectors!....Critical Business and Government Sectors!.... a)a) Finance & BankingFinance & Banking – ATMs, Fraud, Money Laundering b)b) Transport & TourismTransport & Tourism – Airports, Metro, Tourist Sights c)c) Energy & UtilitiesEnergy & Utilities – Nuclear, Chemical & Water Resources d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military 75 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference d)d) Government & DefenceGovernment & Defence – Intel Theft, Hacking, Military e)e) Education & ResearchEducation & Research – Campus-Wide Armed Attacks f)f) Industry & ManufacturingIndustry & Manufacturing – Competitive Espionage g)g) Retail, Sports & CultureRetail, Sports & Culture – Malls, Concerts, Olympics..... ........CSOsCSOs are advised toare advised to URGENTLYURGENTLY define practicaldefine practical & effective action plans to mitigate such attacks!...& effective action plans to mitigate such attacks!...
  • 76. CybersecurityCybersecurity for Critical Sector Networks:for Critical Sector Networks: “Internet of Things”“Internet of Things” Sensor Networks 76 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 77. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Only 73 Nations (38%)Only 73 Nations (38%) 77 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Only 73 Nations (38%)Only 73 Nations (38%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 78. UN/ITU GCAUN/ITU GCA -- GlobalGlobal Cybersecurity Agenda:Cybersecurity Agenda: ---------------------------------------- 11 –– Legal MeasuresLegal Measures 22 –– Technical MeasuresTechnical Measures 33 –– Organisational MeasuresOrganisational Measures 44 –– Capacity BuildingCapacity Building UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda 78 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 44 –– Capacity BuildingCapacity Building 55 –– International CooperationInternational Cooperation ---------------------------------------- ...The...The ITUITU constitutes aconstitutes a uniqueunique global forumglobal forum for partnership andfor partnership and the discussion ofthe discussion of cybersecurity.cybersecurity. -------------------------------------- www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
  • 79. UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies 79 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
  • 80. United Nations/ITUUnited Nations/ITU CybersecurityCybersecurity GuidesGuides 80 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 81. -- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda -- Quest forQuest for CyberConfidenceCyberConfidence (Eng/(Eng/RusRus)) 81 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference LinkLink: www.itu.int/en/publications/
  • 82. EU Agency for Info Security:EU Agency for Info Security: ENISAENISA ENISAENISA Strategic Security FrameworkStrategic Security Framework Provides effectiveProvides effective “Cyber”“Cyber” model formodel for NationalNational GovernmentsGovernments & Ministries& Ministries 82 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference -- ALL EU CountriesALL EU Countries now have approvednow have approved National Cybersecurity StrategiesNational Cybersecurity Strategies -- www.enisa.europa.eu/topics/nationalwww.enisa.europa.eu/topics/national--cybercyber--securitysecurity--strategies/ncssstrategies/ncss--mapmap
  • 83. BET365:BET365: Gambling Sector adoptsGambling Sector adopts ISO/IEC 27001ISO/IEC 27001 Security StandardsSecurity Standards • London 5 April 2017- BET365’SBET365’S commitment to standards recognised with ISO/IEC 27001:2013ISO/IEC 27001:2013 Certification for Info Security Management (ISMS). • UTECH Jamaica PhD - CyberSecurity & GamblingCyberSecurity & Gambling: ““Cybercrime in Online Gaming & Gambling”:Cybercrime in Online Gaming & Gambling”: An 83 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ““Cybercrime in Online Gaming & Gambling”:Cybercrime in Online Gaming & Gambling”: An Implementation Framework for Developing Countries - A Case Study for the Jamaica Jurisdiction: George Brown... .....Research Programme initiated following.....Research Programme initiated following UN/ITUUN/ITU CyberSecurity TrainingCyberSecurity Training @@ UTECHUTECH –– September 2010....September 2010....
  • 84. Cyber ToolCyber Tool: Web: Web--Site SecuritySite Security -- AcunetixAcunetix 84 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 85. Cyber ToolCyber Tool: Web: Web--Site SecuritySite Security -- AcunetixAcunetix 85 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 86. Cyber ToolCyber Tool: Web: Web--Site SecuritySite Security -- AcunetixAcunetix 86 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 87. “Smart Security” for Critical Sectors:“Smart Security” for Critical Sectors: YOURYOUR Shopping and To Do List!Shopping and To Do List! •• Security Audit:Security Audit: In-Depth Security Audit and Action Report - Spanning BOTH Physical and Cybersecurity Operations, Assets and Technologies •• International Standards:International Standards: Understand and Implement Security Policies and Programmes to International Standards – ISO/IEC, UN/ITU, IEEE, NIST, ASIS, ISF •• Training:Training: Professional Training: Form strategic partnerships with leading educational & research institutions to develop pipeline of professional graduations in cybersecurity & integrated security technologies 87 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference graduations in cybersecurity & integrated security technologies •• CERT/CSIRTs:CERT/CSIRTs: Understand the critical role of Cybersecurity CERTs and link their alerts and operational processes within your overall security policies •• Security AssociationsSecurity Associations: Join Security Associations and follow developments in Cybersecurity for ““Intelligent RealIntelligent Real--Time Systems”Time Systems” & “Internet of Things”“Internet of Things” ........YOURYOUR Top Priority is ProfessionalTop Priority is Professional Cybersecurity Training & CertificationCybersecurity Training & Certification withwith regular courseregular course “Top“Top--Ups”Ups” since the field is moving atsince the field is moving at Supersonic SpeedSupersonic Speed!!
  • 88. 1 – “TOP 10 Cyber Threats & Attacks” 2–Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 –Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 88 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 –Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 88 –– YOURYOUR Operational Cyber Defence!Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan!
  • 89. 1 – “TOP 10 Cyber Threats & Attacks” 2–Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 –Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 88 –– YOURYOUR Operational Cyber Defence!Operational Cyber Defence! “Budget, Training & Plan!”“Budget, Training & Plan!” 89 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 –Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: Security for Critical Sectors 88 –– YOURYOUR Operational Cyber Defence!Operational Cyber Defence! 9 – YOURYOUR Cyber Campaign Action Plan! 88 –– YOURYOUR Operational Cyber Defence!Operational Cyber Defence! “Budget, Training & Plan!”“Budget, Training & Plan!”
  • 90. ““YOURYOUR Cyber CampaignCyber Campaign Action PlanAction Plan”” • Defeating the “Bad Guys”“Bad Guys” requires YOU to Launch a Campaign Action Plan for Active Cyber Defence! • Fighting the TOP 10 Cyber ThreatsTOP 10 Cyber Threats requires: ––C$O:C$O: Board Level Security Plan and $ Investment 90 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ––C$O:C$O: Board Level Security Plan and $ Investment ––Technical:Technical: Professional Team, Tools & Training ––Operational:Operational: Security, Standards & Compliance ........CyberSecurityCyberSecurity is Continuously Evolving so keep upis Continuously Evolving so keep up withwith Conferences & Professional MembershipsConferences & Professional Memberships!....!....
  • 91. “In“In--Depth 21stC TechnicalDepth 21stC Technical Cyber DefenceCyber Defence”” • Effective Cyber Defence to TOP 10 Threats requires BOTH Technical & Operational Plans: • Technical Actions, Plans & Policies include: –– DataBaseDataBase:: Secure Physical & Cloud DataBase Scripts –– BackBack--Ups:Ups: Continuous Real-Time DB/Web Back-Ups –– BYOD:BYOD: Strict Policy for “Bring Your Own Device” 91 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference –– BYOD:BYOD: Strict Policy for “Bring Your Own Device” –– eMaileMail:: Script Locks on eMail Attachments & Web Links –– DDoS:DDoS: Switch DNS/IP Settings in case of DDoS Attack –– CERT:CERT: Set-Up Computer Emergency Response Team ............CERTsCERTs work togetherwork together GloballyGlobally to provideto provide Cyber Alerts & IntelligenceCyber Alerts & Intelligence to Govt & Businessto Govt & Business
  • 92. ““YOURYOUR OperationalOperational Cyber DefenceCyber Defence”” •• CC$$O:O: Board Level Role – Chief $ecurity Officer - with Security Investment Plan and $$$ Budget!.. •• Cyber Standards:Cyber Standards: Migrate to International Security Standards such as ISO2700x Series •• Compliance:Compliance: Implement regular IT Asset & Process Audits to ensure Full Compliance •• Training:Training: Ensure Key Staff are Professionally Certified 92 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference •• Training:Training: Ensure Key Staff are Professionally Certified (CISSP) with Bi-Annual Updates. •• Culture:Culture: Launch Business/Agency Security Policy so ALLALL Staff understand their Responsibilities! ....A Major Targeted....A Major Targeted Cyber AttackCyber Attack can easily destroycan easily destroy YOURYOUR BusinessBusiness as effectively as Bankruptcy soas effectively as Bankruptcy so Plan & InvestPlan & Invest!!
  • 93. Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017 NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology 93 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
  • 94. NISTNIST CybersecurityCybersecurity FrameworkFramework National Institute of Standards & TechnologyNational Institute of Standards & Technology 94 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
  • 95. 1 – “TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 95 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7–In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 99 –– YOURYOUR Cyber Campaign Action Plan!Cyber Campaign Action Plan!
  • 96. 1 – “TOP 10 Cyber Threats & Attacks” 2– Cyber Case Studies: Recent Attacks 3 – Cyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert and Attack! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 99 –– YOURYOUR Cyber Campaign Action Plan!Cyber Campaign Action Plan! CSOCSO -- Cyber Leadership!Cyber Leadership! 96 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert and Attack! “Cyber Attack”“Cyber Attack” 7–In-Depth: Security for Critical Sectors 8 – YOURYOUR Operational Cyber Defence! 99 –– YOURYOUR Cyber Campaign Action Plan!Cyber Campaign Action Plan!CSOCSO -- Cyber Leadership!Cyber Leadership!
  • 97. WrapWrap--Up:Up: CyberSecurityCyberSecurity LandscapeLandscape •• Convergence of Physical & Cybersecurity OperationsConvergence of Physical & Cybersecurity Operations •• “Cyber” migrates from IT Dept to Main Board: C“Cyber” migrates from IT Dept to Main Board: C--SuiteSuite •• Global RealGlobal Real--Time Targeted Cyber AttacksTime Targeted Cyber Attacks –– 24/724/7 •• Transition from 20Transition from 20ththC Tools (Firewalls & AntiC Tools (Firewalls & Anti--virus) tovirus) to “Smart” 21“Smart” 21ststC Tools (AI & Machine Learning)C Tools (AI & Machine Learning) 97 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference “Smart” 21“Smart” 21ststC Tools (AI & Machine Learning)C Tools (AI & Machine Learning) •• Emergence of Enterprise “Internet of Things”Emergence of Enterprise “Internet of Things” •• Evolution of Smart Devices, Cities, Economy & SocietyEvolution of Smart Devices, Cities, Economy & Society •• Dramatic increase in Cyber Crime & Cyber TerrorismDramatic increase in Cyber Crime & Cyber Terrorism Now Design & ImplementNow Design & Implement YOURYOUR Business Plan for 21Business Plan for 21ststCC “Cyber”!...“Cyber”!...
  • 98. YOURYOUR Action Plan forAction Plan for 21stC Cyber21stC Cyber!...!... • Every CSO needs Board-Level Approval for Annual Security Business Plan that includes CyberSecurity • YOUR CyberSecurity Plan ActionsOUR CyberSecurity Plan Actions will include: –– Investment BudgetInvestment Budget for Integrated Security Solutions –– Job SpecificationsJob Specifications for Professional “Cyber” Team –– Security Staff TrainingSecurity Staff Training & Professional Development 98 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference –– Security Staff TrainingSecurity Staff Training & Professional Development –– Technical & OperationalTechnical & Operational Plans & Upgrades –– Actions for ComplianceActions for Compliance, Security Audit & ISO Standards .....Invest & Equip.....Invest & Equip YOURYOUR Business withBusiness with 21stC21stC CyberDefenceCyberDefence Download Presentation @Download Presentation @ www.valentina.net/Seville2017/www.valentina.net/Seville2017/
  • 99. “Cyber Defence”“Cyber Defence” againstagainst “Alien Invaders”“Alien Invaders” A.I. & Machine LearningA.I. & Machine Learning CyberSecurity Tools willCyberSecurity Tools will 99 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference CyberSecurity Tools willCyberSecurity Tools will ProvideProvide “Speed of Light”“Speed of Light” RealReal--Time Defence againstTime Defence against TOP 10TOP 10 Threats & Attacks!Threats & Attacks! “Steam Powered Birds arrive over our Cities! - 1981 Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
  • 100. CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 3636thth East/West Security Conference:East/West Security Conference: Seville, SpainSeville, Spain 100 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 101. ThankThank--You!You!ThankThank--You!You! CyberCyber Threats & Defence:Threats & Defence: Intelligent SecurityIntelligent Security 3636thth East/West Security Conference:East/West Security Conference: Seville, SpainSeville, Spain 101 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference ThankThank--You!You!ThankThank--You!You! Download Presentation Slides:Download Presentation Slides: www.Valentina.net/www.Valentina.net/Seville2017Seville2017// Download Presentation Slides:Download Presentation Slides: www.Valentina.net/www.Valentina.net/Seville2017Seville2017//
  • 102. EastEast--West Security Conference: Seville 2017West Security Conference: Seville 2017 -- “Cyber Futures & Defence”“Cyber Futures & Defence” :: OnOn--Line!Line! 102 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Download Link:Download Link: www.valentina.net/Seville2017/www.valentina.net/Seville2017/ Theme (1):Theme (1): Security Futures:Security Futures:20182018--20252025 Theme (2):Theme (2): Cyber Threats & DefenceCyber Threats & Defence
  • 103. Download Presentation Slides:Download Presentation Slides: www.Valentina.netwww.Valentina.net/Seville2017//Seville2017/ Download Presentation Slides:Download Presentation Slides: www.Valentina.netwww.Valentina.net/Seville2017//Seville2017/ 103 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 104. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 104 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 105. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 105 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree (Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
  • 106. Cyber Threats & DefenceCyber Threats & Defence:: Intelligent SecurityIntelligent Security 3636thth East/West Security Conference:East/West Security Conference: Seville, SpainSeville, Spain 106 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference
  • 107. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov 107 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
  • 108. 108 -- Cyber Threats & Effective Defence!Cyber Threats & Effective Defence! -- “Intelligent Business CyberSecurity”“Intelligent Business CyberSecurity” Seville, Spain, 20th – 21st November2017 © Dr David E. Probert : www.VAZA.com © 3636thth International East West Security ConferenceInternational East West Security Conference Link:Link: www.bt.com/rethinkingwww.bt.com/rethinking--thethe--riskrisk