SlideShare ist ein Scribd-Unternehmen logo
1 von 36
THE ERA OF CYBER
EXTORTION AND
RANSOMWARE
www.LIFARS.com
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 2
About Us
Ondrej Krehel
CEO/Founder CISSP, CEH, CEI, EnCE
LIFARS LLC
Connect With Us
@LIFARSLLC
OndrejKrehel/
WWW.LIFARS.com
212-222-7061
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 3
Types of Cyber Extortion
 Ransomware
 Service disruption - DDoS
 Sextortion
 Executives and officers
 Teenagers and mobile
 Payroll data and systems
 Cryptocurrencies and bitcoin
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 4
Ransomware
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 5
Ransomware “Special”
 Survey in the end
 Failed decryption of data – RAID systems
 Secondary intrusion and Ransomware
 Employees and tax data
 Single points of failure
 Recovery plan with partners
 Incident or just Ransomware?
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 6
Let There Be Code
“Let There Be Code”
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 7
Rise of SamSam Ransomware
“Is my JBoss / EAP Server Vulnerable to
Samas Ransomware?”
Redhat / June 24, 2016
“FBI wants U.S. business to help as
cyber extortion gains urgency”
Reuters / May 28, 2016
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 8
SamSam 2018
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 9
SamSam
Pen-testing/
Attack Sever
Scans networks to find
possible entry point to
exploit
Use stolen login
credentials
Deploy malware files
with PSEXEC tool
Delete shadow files via
vssadmin.exe
Install Trojan:MSL/Sam as
Install Ransom:MSIL/Sam
as
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 10
Ransomware Tracker
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 11
How Expensive Hacking for Hire Is
SEXTORTION
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page
Real Stories
13
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 14
Sextortion – Real Cases
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 15
Sextortion – Real Cases
Add a victim on Facebook and message them to video chat
to get sexual video, Facebook friends information, etc.
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 16
Sextortion – Real Cases
OTHER EXTORTIONS
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 18
Fake LinkedIn Profile – Real Cases
LinkedIn page with real name, picture, & job title
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 19
xDedic - Buy and Sell Hacked Companies
 Underground marketplace
which facilitates the selling &
purchasing of RDP servers
 Has tech support, custom tools,
“friendly admins”
 Scam protection
 Over 70,000 servers available
for sale
 From governments to
corporations, ISPs, telcos,
universities and more
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 20
How to buy & sell hacked servers all over the world
Criminal hacks
into a server
Offers access to the
server for sale on xDedic
Over 70 thousand hacked
servers from 173 countries
checked for RDP
configuration, memory,
software, browsing history,
anti virus and more
Cybercriminal
buys the server
Uses it For
Malware campaign, DDoS
attack, Phishing, Social
engineering, cyber
espionage, to gain
foothold for an APT attack
* Then resells server access on xDedic
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 21
Hacking Websites
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 22
xDedic – Real Cases
A stolen Paypal Account by
an xDedic
A sample file that runs an RDP
configuring executable for an xDedic
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page
xDedic – Real Cases
23
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 24
Compromised IP Addresses
Cryptocurrencies and Extortion
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 26
DDoS in Cryptocurrencies
INCIDENT RESPONSE REMDIATION
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 28
Assessment Tools
 How do you know that you are hacked?
 What to do when you or your company is hacked?
 How does one recover and remediate situation?
 Do you have the right tools to minimize your cyber
risk?
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 29
How Do You Know When You Are Hacked?
“Hackers made Iran’s nuclear
computers blast AC/DC”
THE VERGE / August 7, 2014
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 30
What Should You Do When You Are Hacked?
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 31
How To Remediate
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 32
Do You Have The Right Tools To Minimize
Your Cyber Risk
Protect
DetectAnalyze
Respond
• Security Assessment Program
• Penetration Testing
• Threat Assessment Test
• Managed Response and Security
• Threat Intelligence and Monitoring
• Advisory and Training
• Security Awareness Training
• Incident Response Plan
• Ransomware Forensics
• Digital Forensics
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 33
Resources
 U.S. Secret Service Electronic Crimes Task Force
https://www.secretservice.gov/investigation/
 Internet Crimes Complaint Center (IC3)
https://www.ic3.gov/default.aspx
 United States Computer Emergency Readiness Team (US-
CERT) https://www.us-cert.gov/
 National Cyber Security Alliance (NCSA)
https://staysafeonline.org/
 LIFARS blog and Newsletter https://lifars.com/cyber-news/ and
https://lifars.com/blog/
© 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co
m
Page 34
Summary
 Create a Zero Trust Zone
 Develop Trusted Partner Relationships: Vendors & Law
Enforcement
 Ransomware Forensics
 Complete Cyber Extortion Solution
 Ask Experts – Readiness Assessment
 Think about Low Probability Options with High Impact
 Constant Education, Training, & Practice
 Recovery Plan
 Unknown Unknowns
QUESTIONS?
THANK YOU
|
www.LIFARS.com
Subscribe to
our
Newsletter

Weitere ähnliche Inhalte

Was ist angesagt?

5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAHaltdos
 
Data Wars - How Barclays manage the threat from cyber attacks
Data Wars - How Barclays manage the threat from cyber attacksData Wars - How Barclays manage the threat from cyber attacks
Data Wars - How Barclays manage the threat from cyber attacksWhite Clarke Group
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeLaurent Pacalin
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)U.S. Chamber of Commerce
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupLaurent Pacalin
 
State of cybersecurity report 2020- Post Covid 19
State of cybersecurity report 2020- Post Covid 19State of cybersecurity report 2020- Post Covid 19
State of cybersecurity report 2020- Post Covid 19HarryJake1
 
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19P19 what were up against why good guys do bad things_sherri davidoff_6.12.19
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19National Retail Federation
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
The Equifax Data Breach - How to Tell if You've Been Impacted
The Equifax Data Breach - How to Tell if You've Been ImpactedThe Equifax Data Breach - How to Tell if You've Been Impacted
The Equifax Data Breach - How to Tell if You've Been ImpactedCBIZ, Inc.
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeJeferson Propheta
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Money 2Conf
 
Equifax Flyer Aug 2017
Equifax Flyer Aug 2017Equifax Flyer Aug 2017
Equifax Flyer Aug 2017Daniel Michels
 
QTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicQTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicMichelle Belnap
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerDigital Transformation EXPO Event Series
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 

Was ist angesagt? (20)

5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
ICSA CPD - Cyber breaches
ICSA CPD -   Cyber breachesICSA CPD -   Cyber breaches
ICSA CPD - Cyber breaches
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
 
Data Wars - How Barclays manage the threat from cyber attacks
Data Wars - How Barclays manage the threat from cyber attacksData Wars - How Barclays manage the threat from cyber attacks
Data Wars - How Barclays manage the threat from cyber attacks
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
State of cybersecurity report 2020- Post Covid 19
State of cybersecurity report 2020- Post Covid 19State of cybersecurity report 2020- Post Covid 19
State of cybersecurity report 2020- Post Covid 19
 
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19P19 what were up against why good guys do bad things_sherri davidoff_6.12.19
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
CISA's Privacy Facts
CISA's Privacy FactsCISA's Privacy Facts
CISA's Privacy Facts
 
The Equifax Data Breach - How to Tell if You've Been Impacted
The Equifax Data Breach - How to Tell if You've Been ImpactedThe Equifax Data Breach - How to Tell if You've Been Impacted
The Equifax Data Breach - How to Tell if You've Been Impacted
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of Cybercrime
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?
 
Equifax Flyer Aug 2017
Equifax Flyer Aug 2017Equifax Flyer Aug 2017
Equifax Flyer Aug 2017
 
QTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographicQTS Datacenters-Cyber Security infographic
QTS Datacenters-Cyber Security infographic
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 

Ähnlich wie Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Ransomware for EC Council

Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Dr. Ahmed Al Zaidy
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachKevin Murphy
 
Law Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can HelpLaw Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can HelpimmixGroup
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Sotw 2017 slideshare v2
Sotw 2017 slideshare v2Sotw 2017 slideshare v2
Sotw 2017 slideshare v2MenloSecurity
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Miguel Lopes - From Strategy to Subscription: Design to Win - Productized15
Miguel Lopes - From Strategy to Subscription: Design to Win  - Productized15Miguel Lopes - From Strategy to Subscription: Design to Win  - Productized15
Miguel Lopes - From Strategy to Subscription: Design to Win - Productized15Productized
 
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...DATAVERSITY
 
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security OrganizationRyan Wisniewski
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019NowSecure
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Dr. Ahmed Al Zaidy
 
The Lima Consulting Group Digital Transformation Maturity Model Presented at ...
The Lima Consulting Group Digital Transformation Maturity Model Presented at ...The Lima Consulting Group Digital Transformation Maturity Model Presented at ...
The Lima Consulting Group Digital Transformation Maturity Model Presented at ...Lima Consulting Group
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionMike Wons
 
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Kehinde Tolude
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessBomgar
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...Amazon Web Services
 

Ähnlich wie Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Ransomware for EC Council (20)

Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
 
Funsec3e ppt ch11
Funsec3e ppt ch11Funsec3e ppt ch11
Funsec3e ppt ch11
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 
Law Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can HelpLaw Enforcement Needs a Boost--Here's How Technology Can Help
Law Enforcement Needs a Boost--Here's How Technology Can Help
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Sotw 2017 slideshare v2
Sotw 2017 slideshare v2Sotw 2017 slideshare v2
Sotw 2017 slideshare v2
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Miguel Lopes - From Strategy to Subscription: Design to Win - Productized15
Miguel Lopes - From Strategy to Subscription: Design to Win  - Productized15Miguel Lopes - From Strategy to Subscription: Design to Win  - Productized15
Miguel Lopes - From Strategy to Subscription: Design to Win - Productized15
 
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
 
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
The Lima Consulting Group Digital Transformation Maturity Model Presented at ...
The Lima Consulting Group Digital Transformation Maturity Model Presented at ...The Lima Consulting Group Digital Transformation Maturity Model Presented at ...
The Lima Consulting Group Digital Transformation Maturity Model Presented at ...
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged Access
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
IoT Microcontrollers and Getting Started with Amazon FreeRTOS (IOT338-R1) - A...
 

Mehr von EC-Council

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldEC-Council
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approachEC-Council
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident ResponseEC-Council
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinEC-Council
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeEC-Council
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverEC-Council
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...EC-Council
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoEC-Council
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderEC-Council
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanEC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019EC-Council
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...EC-Council
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerEC-Council
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementEC-Council
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...EC-Council
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...EC-Council
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...EC-Council
 

Mehr von EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Kürzlich hochgeladen (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Ransomware for EC Council

  • 1. THE ERA OF CYBER EXTORTION AND RANSOMWARE www.LIFARS.com
  • 2. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 2 About Us Ondrej Krehel CEO/Founder CISSP, CEH, CEI, EnCE LIFARS LLC Connect With Us @LIFARSLLC OndrejKrehel/ WWW.LIFARS.com 212-222-7061
  • 3. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 3 Types of Cyber Extortion  Ransomware  Service disruption - DDoS  Sextortion  Executives and officers  Teenagers and mobile  Payroll data and systems  Cryptocurrencies and bitcoin
  • 4. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 4 Ransomware
  • 5. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 5 Ransomware “Special”  Survey in the end  Failed decryption of data – RAID systems  Secondary intrusion and Ransomware  Employees and tax data  Single points of failure  Recovery plan with partners  Incident or just Ransomware?
  • 6. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 6 Let There Be Code “Let There Be Code”
  • 7. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 7 Rise of SamSam Ransomware “Is my JBoss / EAP Server Vulnerable to Samas Ransomware?” Redhat / June 24, 2016 “FBI wants U.S. business to help as cyber extortion gains urgency” Reuters / May 28, 2016
  • 8. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 8 SamSam 2018
  • 9. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 9 SamSam Pen-testing/ Attack Sever Scans networks to find possible entry point to exploit Use stolen login credentials Deploy malware files with PSEXEC tool Delete shadow files via vssadmin.exe Install Trojan:MSL/Sam as Install Ransom:MSIL/Sam as
  • 10. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 10 Ransomware Tracker
  • 11. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 11 How Expensive Hacking for Hire Is
  • 13. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page Real Stories 13
  • 14. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 14 Sextortion – Real Cases
  • 15. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 15 Sextortion – Real Cases Add a victim on Facebook and message them to video chat to get sexual video, Facebook friends information, etc.
  • 16. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 16 Sextortion – Real Cases
  • 18. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 18 Fake LinkedIn Profile – Real Cases LinkedIn page with real name, picture, & job title
  • 19. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 19 xDedic - Buy and Sell Hacked Companies  Underground marketplace which facilitates the selling & purchasing of RDP servers  Has tech support, custom tools, “friendly admins”  Scam protection  Over 70,000 servers available for sale  From governments to corporations, ISPs, telcos, universities and more
  • 20. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 20 How to buy & sell hacked servers all over the world Criminal hacks into a server Offers access to the server for sale on xDedic Over 70 thousand hacked servers from 173 countries checked for RDP configuration, memory, software, browsing history, anti virus and more Cybercriminal buys the server Uses it For Malware campaign, DDoS attack, Phishing, Social engineering, cyber espionage, to gain foothold for an APT attack * Then resells server access on xDedic
  • 21. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 21 Hacking Websites
  • 22. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 22 xDedic – Real Cases A stolen Paypal Account by an xDedic A sample file that runs an RDP configuring executable for an xDedic
  • 23. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page xDedic – Real Cases 23
  • 24. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 24 Compromised IP Addresses
  • 26. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 26 DDoS in Cryptocurrencies
  • 28. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 28 Assessment Tools  How do you know that you are hacked?  What to do when you or your company is hacked?  How does one recover and remediate situation?  Do you have the right tools to minimize your cyber risk?
  • 29. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 29 How Do You Know When You Are Hacked? “Hackers made Iran’s nuclear computers blast AC/DC” THE VERGE / August 7, 2014
  • 30. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 30 What Should You Do When You Are Hacked?
  • 31. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 31 How To Remediate
  • 32. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 32 Do You Have The Right Tools To Minimize Your Cyber Risk Protect DetectAnalyze Respond • Security Assessment Program • Penetration Testing • Threat Assessment Test • Managed Response and Security • Threat Intelligence and Monitoring • Advisory and Training • Security Awareness Training • Incident Response Plan • Ransomware Forensics • Digital Forensics
  • 33. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 33 Resources  U.S. Secret Service Electronic Crimes Task Force https://www.secretservice.gov/investigation/  Internet Crimes Complaint Center (IC3) https://www.ic3.gov/default.aspx  United States Computer Emergency Readiness Team (US- CERT) https://www.us-cert.gov/  National Cyber Security Alliance (NCSA) https://staysafeonline.org/  LIFARS blog and Newsletter https://lifars.com/cyber-news/ and https://lifars.com/blog/
  • 34. © 2018 LIFARS, LLC All Rights Reserved www.LIFARS.co m Page 34 Summary  Create a Zero Trust Zone  Develop Trusted Partner Relationships: Vendors & Law Enforcement  Ransomware Forensics  Complete Cyber Extortion Solution  Ask Experts – Readiness Assessment  Think about Low Probability Options with High Impact  Constant Education, Training, & Practice  Recovery Plan  Unknown Unknowns

Hinweis der Redaktion

  1. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  2. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  3. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  4. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  5. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  6. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  7. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  8. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  9. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  10. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  11. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  12. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  13. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  14. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  15. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  16. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  17. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  18. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  19. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  20. https://lifars.com/potentially-compromised-ip-addresses/ Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  21. https://lifars.com/potentially-compromised-ip-addresses/ Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  22. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  23. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  24. Combining the memory IOC’s with a list of IOCs that we found on disk we can come up with a comprehensive list of IOCs
  25. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  26. Combining the memory IOC’s with a list of IOCs that we found on disk we can come up with a comprehensive list of IOCs
  27. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  28. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE
  29. Slide Design and Saving Notes 1.) Duplicate slide before editing. Right click slide in the slide section on the left and select duplicate slide or ( Shift+Command+D, MAC ) ( Shift+Control+D, Windows ). 2.) Copy/Paste ( control+C, control+V, Windows ) ( command+C, command+V, MAC ) or select any editable element from original slide of duplicated slide for use on duplicated slide by right-clicking on element and selecting Copy, then going to duplicated slide and go to Edit > Paste. 3.) Saving PPT Template: Delete any unused slides by right-clicking on slide in left panel and clicking Delete. Next got to File > Save As ( Shift+Command+S, MAC ) ( Shift+Control+S, Windows ), then enter a specific file name and press SAVE