SlideShare a Scribd company logo
1 of 26
Deloitte.
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
The Hacking Mind 
Know your enemy
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
Quotes 
“Security is the responsibility of the datacenter” 
“Our organization is not a likely target.” 
“Security does not help us to sell more products” 
“We don’t have budget for security improvements”
© 2014 Deloitte The Netherlands 4 
“They Couldn’t Hit an Elephant at that Distance.” 
John SedgwickMay 9, 1864
The danger 
And the protection against Cybercrime 
© 2014 Deloitte The Netherlands 5 
8% 
45% 
47% 
0% 
49% 
51% 
0% 
10% 
20% 
30% 
40% 
50% 
60% 
Low/Bad 
Average 
High/Good 
Risk andprotectionagainstcybercrime (n=51) 
Risk 
Protected 
24% 
63% 
14% 
Victim of cybercrime? (n=51) 
Yes 
No 
Unkown 
-60 
-40 
-20 
0 
20 
40 
60 
Mobile 
Social media 
Data analytics 
Cyber security 
CFO’s: Investment priorities (n=25) 
(Extremely) High 
(Extremely) Low 
Executives estimate the risks of digitalization to be high and claim to be adequately protected against cyber attacks. However, they did decide to heavily invest in Cyber security.
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
Security Controls 
Business Impact 
An organization’s point of view 
Text 
Asset 
An attacker’s point of view 
Set of skills 
Motives 
Text 
Actor 
Attack Vectors
“A hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. A hacker is someone who experiments with the limitations of systems for intellectual curiosity.” Bruce Schneier, Secrets and Lies (2000) 
The danger 
Whatis a hacker? 
© 2014 Deloitte The Netherlands 7
The danger 
Who is targeting you? 
© 2014 Deloitte The Netherlands 8 
Attacker Determination 
Attacker Sophistication 
Accidental 
Discovery 
Malware 
Insider 
Lone Hacker / 
Hobbyist 
Business 
Partner 
‘Script kiddy’ 
Disgruntled 
ex-Employee 
Disgruntled 
Customer 
Competitor 
Disgruntled 
ex-IT 
Administrator 
‘Hacktivism’ 
Cyber 
Terrorism 
Hacker 
Collectives 
Organised Crime 
State-sponsored 
Cyber Warfare 
Type Permission? Criminal Intent? 
Blackhat No Yes 
Greyhat No No 
Whitehat Yes No
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
Some thoughts 
1.Attackersandresearchersscan everyIP in the public domain daily; 
2.Non-targeted attacks can have significant impact; 
3.A majority of the security incidents are caused by non-targeted attacks; 
4.Non-targetedattacks canlead totargetedattacks; 
Targeted Attacks 
Focused on your day-to-day business activities, for example by: 
•Cybercriminals; steal data, steal money, affect continuity 
•Disgruntled employees; compromise systems from the inside 
•Hacktivists; having moral reasons to attack 
Non-Targeted Attacks 
Mass-spread malwarevia email, websites, usb-sticks aimingto: 
•Infect systems/servers forbotnets 
•Encryptdata andforce organizationtopay(ransomware) 
•Createstepping stoneforconsequent targetedattack 
Targeted and Non-Targeted Attacks
Hackers 
•Unlimited time, low costs 
•Only one hole is sufficient 
•Rules do not apply 
Defenders 
•Limited time, limited budget 
•Time between discovery and mitigation 
•Everything is connected and nobody is in charge 
Hackers vs. Defenders 
An asymmetric fight 
© 2014 Deloitte The Netherlands 10
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
CyberResilience 
How to survive and thrive in the digital world
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
Zodat jij en je organisatie je onbezorgd op het internet kunnen begeven. 
Happy foto!
Deloitte. 
Deloitte refers to one or more of Deloitte ToucheTohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a more detailed description of DTTL and its member firms. 
This communication is for internal distribution and use only among personnel of Deloitte ToucheTohmatsu Limited, its member firms, and their related entities (collectively, the “Deloitte network”). None of the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this communication.

More Related Content

Viewers also liked

Marketing of Emptiness Eng
Marketing of Emptiness EngMarketing of Emptiness Eng
Marketing of Emptiness EngSCodeseira
 
IES RIBERA DEL FARDES. Escuela, espacio de paz
IES RIBERA DEL FARDES. Escuela, espacio de pazIES RIBERA DEL FARDES. Escuela, espacio de paz
IES RIBERA DEL FARDES. Escuela, espacio de pazPepa Líndez Cazorla
 
Todos Cantamos
Todos CantamosTodos Cantamos
Todos Cantamosdiegocamin
 
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...Aranda Emprende
 
La participación ciudadana en la administración local
La participación ciudadana en la administración localLa participación ciudadana en la administración local
La participación ciudadana en la administración localIbiza Melián
 
Why customer value propositions really matter - A focus on the telecom servic...
Why customer value propositions really matter - A focus on the telecom servic...Why customer value propositions really matter - A focus on the telecom servic...
Why customer value propositions really matter - A focus on the telecom servic...Juan Carlos Sanchez
 
Producción gráfica 2
Producción gráfica 2Producción gráfica 2
Producción gráfica 2titochagoya
 
Ec. internacional clase 14 inversión extranjera directa
Ec. internacional   clase 14 inversión extranjera directaEc. internacional   clase 14 inversión extranjera directa
Ec. internacional clase 14 inversión extranjera directaCarlos Rojas
 
Ideas innovadoras CGInnova
Ideas innovadoras CGInnovaIdeas innovadoras CGInnova
Ideas innovadoras CGInnovaAndoni Carrion
 
La zarzuela (2) (1) (1)
La zarzuela (2) (1) (1)La zarzuela (2) (1) (1)
La zarzuela (2) (1) (1)ajc98
 
Threadless Email and Social Media Presentation #MMSEM11
Threadless Email and Social Media Presentation #MMSEM11Threadless Email and Social Media Presentation #MMSEM11
Threadless Email and Social Media Presentation #MMSEM11Marcel Media
 

Viewers also liked (16)

Marketing of Emptiness Eng
Marketing of Emptiness EngMarketing of Emptiness Eng
Marketing of Emptiness Eng
 
IES RIBERA DEL FARDES. Escuela, espacio de paz
IES RIBERA DEL FARDES. Escuela, espacio de pazIES RIBERA DEL FARDES. Escuela, espacio de paz
IES RIBERA DEL FARDES. Escuela, espacio de paz
 
Todos Cantamos
Todos CantamosTodos Cantamos
Todos Cantamos
 
Diseño proyectos 102058__16
Diseño proyectos  102058__16Diseño proyectos  102058__16
Diseño proyectos 102058__16
 
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
 
La participación ciudadana en la administración local
La participación ciudadana en la administración localLa participación ciudadana en la administración local
La participación ciudadana en la administración local
 
Solar panel
Solar panelSolar panel
Solar panel
 
Why customer value propositions really matter - A focus on the telecom servic...
Why customer value propositions really matter - A focus on the telecom servic...Why customer value propositions really matter - A focus on the telecom servic...
Why customer value propositions really matter - A focus on the telecom servic...
 
Producción gráfica 2
Producción gráfica 2Producción gráfica 2
Producción gráfica 2
 
Ec. internacional clase 14 inversión extranjera directa
Ec. internacional   clase 14 inversión extranjera directaEc. internacional   clase 14 inversión extranjera directa
Ec. internacional clase 14 inversión extranjera directa
 
Next-Generation Optical Access Architecture
Next-Generation Optical Access ArchitectureNext-Generation Optical Access Architecture
Next-Generation Optical Access Architecture
 
Ideas innovadoras CGInnova
Ideas innovadoras CGInnovaIdeas innovadoras CGInnova
Ideas innovadoras CGInnova
 
OESTRUS OVIS
OESTRUS OVISOESTRUS OVIS
OESTRUS OVIS
 
La zarzuela (2) (1) (1)
La zarzuela (2) (1) (1)La zarzuela (2) (1) (1)
La zarzuela (2) (1) (1)
 
Ingresantes gue las mercedes 2015
Ingresantes gue las mercedes 2015Ingresantes gue las mercedes 2015
Ingresantes gue las mercedes 2015
 
Threadless Email and Social Media Presentation #MMSEM11
Threadless Email and Social Media Presentation #MMSEM11Threadless Email and Social Media Presentation #MMSEM11
Threadless Email and Social Media Presentation #MMSEM11
 

Similar to Mkb cyber advies nederland / Roel van Rijsewijk Deloitte

Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Xtandit_Marketing
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowqmatheson
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynoteGerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynoteXeroAccounting
 
Deloitte johan ten houten
Deloitte johan ten houtenDeloitte johan ten houten
Deloitte johan ten houtenBigDataExpo
 
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014CIOnl
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Harnessing the 'Bang': from Digital Disruption to Digital Transformation
Harnessing the 'Bang': from Digital Disruption to Digital TransformationHarnessing the 'Bang': from Digital Disruption to Digital Transformation
Harnessing the 'Bang': from Digital Disruption to Digital TransformationStephen Huppert
 
Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Bluewire Media
 
Everett.brandboek.digitaal.2
Everett.brandboek.digitaal.2Everett.brandboek.digitaal.2
Everett.brandboek.digitaal.2Onno Tjeerdsma
 
Larry Quinlan closing keynote
Larry Quinlan closing keynoteLarry Quinlan closing keynote
Larry Quinlan closing keynoteSeattleSIM
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Annie-Marie Page
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Developing The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar IiDeveloping The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar Iiphilliplhunter
 

Similar to Mkb cyber advies nederland / Roel van Rijsewijk Deloitte (20)

Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynoteGerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
 
Deloitte johan ten houten
Deloitte johan ten houtenDeloitte johan ten houten
Deloitte johan ten houten
 
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
 
Fidelis Cybersecurity Overview
Fidelis Cybersecurity OverviewFidelis Cybersecurity Overview
Fidelis Cybersecurity Overview
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Harnessing the 'Bang': from Digital Disruption to Digital Transformation
Harnessing the 'Bang': from Digital Disruption to Digital TransformationHarnessing the 'Bang': from Digital Disruption to Digital Transformation
Harnessing the 'Bang': from Digital Disruption to Digital Transformation
 
Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013
 
Dr Harvey Lewis - Trends in Big Data, Key Challenges for Skills
Dr Harvey Lewis - Trends in Big Data, Key Challenges for SkillsDr Harvey Lewis - Trends in Big Data, Key Challenges for Skills
Dr Harvey Lewis - Trends in Big Data, Key Challenges for Skills
 
Everett.brandboek.digitaal.2
Everett.brandboek.digitaal.2Everett.brandboek.digitaal.2
Everett.brandboek.digitaal.2
 
Larry Quinlan closing keynote
Larry Quinlan closing keynoteLarry Quinlan closing keynote
Larry Quinlan closing keynote
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Developing The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar IiDeveloping The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar Ii
 

Recently uploaded

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 

Recently uploaded (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 

Mkb cyber advies nederland / Roel van Rijsewijk Deloitte

  • 2. © 2014. For information, contact Deloitte Touche TohmatsuLimited. The Hacking Mind Know your enemy
  • 3. © 2014. For information, contact Deloitte Touche TohmatsuLimited. Quotes “Security is the responsibility of the datacenter” “Our organization is not a likely target.” “Security does not help us to sell more products” “We don’t have budget for security improvements”
  • 4. © 2014 Deloitte The Netherlands 4 “They Couldn’t Hit an Elephant at that Distance.” John SedgwickMay 9, 1864
  • 5. The danger And the protection against Cybercrime © 2014 Deloitte The Netherlands 5 8% 45% 47% 0% 49% 51% 0% 10% 20% 30% 40% 50% 60% Low/Bad Average High/Good Risk andprotectionagainstcybercrime (n=51) Risk Protected 24% 63% 14% Victim of cybercrime? (n=51) Yes No Unkown -60 -40 -20 0 20 40 60 Mobile Social media Data analytics Cyber security CFO’s: Investment priorities (n=25) (Extremely) High (Extremely) Low Executives estimate the risks of digitalization to be high and claim to be adequately protected against cyber attacks. However, they did decide to heavily invest in Cyber security.
  • 6. © 2014. For information, contact Deloitte Touche TohmatsuLimited. Security Controls Business Impact An organization’s point of view Text Asset An attacker’s point of view Set of skills Motives Text Actor Attack Vectors
  • 7. “A hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. A hacker is someone who experiments with the limitations of systems for intellectual curiosity.” Bruce Schneier, Secrets and Lies (2000) The danger Whatis a hacker? © 2014 Deloitte The Netherlands 7
  • 8. The danger Who is targeting you? © 2014 Deloitte The Netherlands 8 Attacker Determination Attacker Sophistication Accidental Discovery Malware Insider Lone Hacker / Hobbyist Business Partner ‘Script kiddy’ Disgruntled ex-Employee Disgruntled Customer Competitor Disgruntled ex-IT Administrator ‘Hacktivism’ Cyber Terrorism Hacker Collectives Organised Crime State-sponsored Cyber Warfare Type Permission? Criminal Intent? Blackhat No Yes Greyhat No No Whitehat Yes No
  • 9. © 2014. For information, contact Deloitte Touche TohmatsuLimited. Some thoughts 1.Attackersandresearchersscan everyIP in the public domain daily; 2.Non-targeted attacks can have significant impact; 3.A majority of the security incidents are caused by non-targeted attacks; 4.Non-targetedattacks canlead totargetedattacks; Targeted Attacks Focused on your day-to-day business activities, for example by: •Cybercriminals; steal data, steal money, affect continuity •Disgruntled employees; compromise systems from the inside •Hacktivists; having moral reasons to attack Non-Targeted Attacks Mass-spread malwarevia email, websites, usb-sticks aimingto: •Infect systems/servers forbotnets •Encryptdata andforce organizationtopay(ransomware) •Createstepping stoneforconsequent targetedattack Targeted and Non-Targeted Attacks
  • 10. Hackers •Unlimited time, low costs •Only one hole is sufficient •Rules do not apply Defenders •Limited time, limited budget •Time between discovery and mitigation •Everything is connected and nobody is in charge Hackers vs. Defenders An asymmetric fight © 2014 Deloitte The Netherlands 10
  • 11. © 2014. For information, contact Deloitte Touche TohmatsuLimited. CyberResilience How to survive and thrive in the digital world
  • 12. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 13. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 14. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 15. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 16. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 17. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 18. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 19. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 20. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 21. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 22. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 23. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 24. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 25. © 2014. For information, contact Deloitte Touche TohmatsuLimited. Zodat jij en je organisatie je onbezorgd op het internet kunnen begeven. Happy foto!
  • 26. Deloitte. Deloitte refers to one or more of Deloitte ToucheTohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a more detailed description of DTTL and its member firms. This communication is for internal distribution and use only among personnel of Deloitte ToucheTohmatsu Limited, its member firms, and their related entities (collectively, the “Deloitte network”). None of the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this communication.