SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
The cybersecurity
landscape is changing
Are you keeping up?
Tudor Damian
Managing Partner & CIO @ Avaelgo
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Many thanks to our sponsors & partners!
GOLD
SILVER
PARTNERS
PLATINUM
POWERED BY
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Tudor Damian
• Managing Partner & CIO @ Avaelgo
– Offering Peace of Mind as-a-Service
– 50+ people, 5 Microsoft MVPs
– IT Advisory, Cloud Strategy, Managed Services, Security, Training
• Co-founder @ ITCamp & ITCamp Community
– Cloud and Datacenter Management MVP (Microsoft)
– Certified Ethical Hacker (EC-Council)
– Certified Security Professional (CQURE)
• Contact: tudor.damian@avaelgo.ro / @tudydamian / tudy.tel
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Session overview
• A cybersecurity primer
• The changing landscape
– Social Engineering
• What’s going on in cybersecurity lately?
– Some of the latest threats, vulnerabilities, exploits and attack
methods
• If the demo gods are with us…
– ARP poisoning
– Credential harvesting
– MFA bypass
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
A cybersecurity primer
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Window of Vulnerability - overview
Vulnerability
is discovered
Exploit
released in
the wild
Zero Day
Attacks
Vulnerability
is known by
the vendor
Vulnerability
disclosed
publicly
Security
tools (IDS,
antivirus) get
updated
Patch is
published by
vendor
Existence of
patch is
widely
known
Patch is
installed on
affected
systems
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Window of Vulnerability - overview
Vulnerability
is discovered
Exploit
released in
the wild
Zero Day
Attacks
Vulnerability
is known by
the vendor
Vulnerability
disclosed
publicly
Security
tools (IDS,
antivirus) get
updated
Patch is
published by
vendor
Existence of
patch is
widely
known
Patch is
installed on
affected
systems
This could take weeks, or even months
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Essential elements of Information Security
• A state of well-being of information and infrastructure
in which the possibility of theft, tampering, and
disruption of information and services is kept at low
or tolerable levels
Confidentiality
• The assurance that the
information is
accessible only to those
authorized to have
access
Integrity
• The trustworthiness of
data or resources in
terms of preventing
improper and
unauthorized changes
Availability
• The assurance that the
systems responsible for
delivering, storing and
processing information
are accessible when
required by the
authorized users
Authenticity
• The characteristic of a
communication,
document or any data
that ensures the quality
of being genuine
Non-repudiation
• A guarantee that the
sender of a message
cannot later deny
having sent the
message and that the
recipient cannot deny
having received the
message
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
The underwear study ☺
Source: https://www.kaspersky.com/blog/passwords-are-like-underwear/10645/
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Passwords are like underwear…
• …change them often
• …don’t leave them
lying around
• …don’t share them
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Would you say that you have more pairs of underpants
(panties, shorts) than passwords?
The underwear study – question 1
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Would you say that you have more pairs of underpants
(panties, shorts) than passwords?
The underwear study – question 1
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Speaking about your underwear and your passwords,
how often do you change them?
The underwear study – question 2
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Speaking about your underwear and your passwords,
how often do you change them?
The underwear study – question 2
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Have you ever shared your underwear or password with
a friend or member of your family?
The underwear study – question 3
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Have you ever shared your underwear or password with
a friend or member of your family?
The underwear study – question 3
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
We won’t focus on everything… ☺
Personal
Computer
Security
Passwords
Social
Engineering
Identity Theft Email Security Safe Browsing
Data Protection Encryption
Physical
Security
Online
Transactions
Security
Digital
Signature &
Certificates
Data Backup
Social
Networking
Antivirus
Protection
Disaster
Recovery
Internet
Security
Credit Card
Frauds
Monitoring
Kids Online
Wireless &
Home Network
Security
Bluetooth
Security
Mobile Device
Security
OS Security
Policies &
Compliance
…
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
SOCIAL ENGINEERING
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Who will win?
Security
tools
Human
error
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
If an attacker
sends an email to
100 people inside
your company…
…23 people will
open it…
…11 people will
open the
attachment…
…and 6 of them
will do so within
the first hour
Attacks happen fast and are hard to stop
Source: Verizon Data Breach Report
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Can we really ignore the human factor?
• 55% of organizations were the target of successful
cyber attacks over the course of a year
• Around 84% of cyberattacks reported were due to
human error
–Failing to apply a patch, easy-to-guess passwords,
phishing, etc.
Source: https://www.computerweekly.com/news/450425184/Security-professionals-name-top-causes-of-breaches
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Can we really ignore the human factor?
• 42% percent of security breach victims feel they have
to figure out the cause by themselves
–52% will work with consultants or other outside help
–Under 20% turn to colleagues for advice on data protection
and risk mitigation
Source: https://www.computerweekly.com/news/450425184/Security-professionals-name-top-causes-of-breaches
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Can we really ignore the human factor?
• Only 28% follow best practices by erasing and
rebuilding a computer’s software after a potential
malware attack
–The others either manually erase the malware (46%) or rely
on AV tools to identify and clean the malware (24%)
Source: https://www.computerweekly.com/news/450425184/Security-professionals-name-top-causes-of-breaches
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
You’ve already got social engineers out there
• Psychologists
• Lawyers
• Governments
• Salespeople
• Recruiters
• Spies
• Scammers
• Identity thieves
• etc. ☺
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
WHAT’S BEEN GOING ON LATELY?
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
• Ransomware-as-a-Service (Karmen)
• Router exploits allowing remote control (Cherry Blossom)
• Data exfiltration via router leds (xLED)
• Attacks on Bluetooth (BlueBorne)
• Hacking phones via ultrasound (DolphinAttack)
• Using HDD noise to steal data (DiskFiltration)
• IoT Botnets (Mirai)
• The ability to build your own BTS for less than 1000$
• Meltdown & Spectre
• …and many, many more
The past couple of years came with new threats
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
…and we won’t go into details there either ☺
Equifax Apple Deloitte LinkedIn Sony VK.com Dropbox Amazon Yahoo
Equation
Group
Shadow
Brokers
BlueBorne Ccleaner MySpace ExpensiveWall Dragonfly Punycode BadUSB Superfish Heartbleed
Shellshock Karmen POODLE FREAK GHOST DROWN Dirty COW STAGEFRIGHT QuadRooter XCodeGhost
Mirai Carbanak Gemalto SS7 Locky DMA Locker Surprise Ranscam SWIFT Weebly
Sundown CrypMIC TrickBot Angler RIG Tumblr Neutrino xDedic BlackEnergy ProjectSauron
Adwind Danti SVCMONDR Lazarus FruityArmor ScarCruft Lurk Ammyy Admin Chinastrats Patchwork
TeslaCrypt WannaCry Petya NotPetya Ethereum LeakerLocker CouchPotato NanoCore RAT SambaCry Ropemaker
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
ARP POISONING
DEMO 1
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
CREDENTIAL HARVESTING
DEMO 2
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
MFA BYPASS
DEMO 3
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
• No system is 100% secure
– Anyone who thinks differently will eventually be proven wrong
– Constantly find new ways to make it harder for you to be a target
• Security hasn’t really been a priority in past years
– The essential security elements are rarely looked into
– This has affected the entire IT industry (web apps, OS-es, IoT, etc.)
• When it comes to security, try not to look in the wrong place
– It’s rarely about the technology, it’s often about the people
– Social Engineering and insider threats are on the rise
Things people need to be reminded of
@ITCAMPRO #ITCAMP18Community Conference for IT Professionals
Q & A

Weitere ähnliche Inhalte

Was ist angesagt?

Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonSSIMeetup
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Andrew Manoske
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)ITCamp
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Clare Nelson, CISSP, CIPP-E
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 

Was ist angesagt? (20)

Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
hackers
hackershackers
hackers
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Is the us engaged in a cyber war
Is the us engaged in a cyber warIs the us engaged in a cyber war
Is the us engaged in a cyber war
 

Ähnlich wie ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you keeping up?

Modern cybersecurity threats, and shiny new tools to help deal with them - T...
 Modern cybersecurity threats, and shiny new tools to help deal with them - T... Modern cybersecurity threats, and shiny new tools to help deal with them - T...
Modern cybersecurity threats, and shiny new tools to help deal with them - T...ITCamp
 
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themModern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themTudor Damian
 
ITCamp 2018 - Walter Belgers - Lockpicking and IT security
ITCamp 2018 - Walter Belgers - Lockpicking and IT securityITCamp 2018 - Walter Belgers - Lockpicking and IT security
ITCamp 2018 - Walter Belgers - Lockpicking and IT securityITCamp
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4TEKMONKS
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4Rohit Kapoor
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBarcamp Kerala
 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...ITCamp
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon usJonathan Sinclair
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer RigginsHow to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer RigginsFuture Insights
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 

Ähnlich wie ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you keeping up? (20)

Modern cybersecurity threats, and shiny new tools to help deal with them - T...
 Modern cybersecurity threats, and shiny new tools to help deal with them - T... Modern cybersecurity threats, and shiny new tools to help deal with them - T...
Modern cybersecurity threats, and shiny new tools to help deal with them - T...
 
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themModern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
 
ITCamp 2018 - Walter Belgers - Lockpicking and IT security
ITCamp 2018 - Walter Belgers - Lockpicking and IT securityITCamp 2018 - Walter Belgers - Lockpicking and IT security
ITCamp 2018 - Walter Belgers - Lockpicking and IT security
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer RigginsHow to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 

Mehr von ITCamp

ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp
 
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp
 
ITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp
 
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp
 
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp
 
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp
 
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...ITCamp
 
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...ITCamp
 
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp
 
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp
 
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp
 
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp
 
ITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp
 
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp
 
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp
 
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp
 
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp
 
ITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp
 
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp
 
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp
 

Mehr von ITCamp (20)

ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
 
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
 
ITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing Skills
 
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
 
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
 
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
 
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
 
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
 
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
 
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
 
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
 
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
 
ITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AI
 
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
 
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
 
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
 
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
 
ITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian Quality
 
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
 
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
 

Kürzlich hochgeladen

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you keeping up?

  • 1. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals The cybersecurity landscape is changing Are you keeping up? Tudor Damian Managing Partner & CIO @ Avaelgo
  • 2. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Many thanks to our sponsors & partners! GOLD SILVER PARTNERS PLATINUM POWERED BY
  • 3. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Tudor Damian • Managing Partner & CIO @ Avaelgo – Offering Peace of Mind as-a-Service – 50+ people, 5 Microsoft MVPs – IT Advisory, Cloud Strategy, Managed Services, Security, Training • Co-founder @ ITCamp & ITCamp Community – Cloud and Datacenter Management MVP (Microsoft) – Certified Ethical Hacker (EC-Council) – Certified Security Professional (CQURE) • Contact: tudor.damian@avaelgo.ro / @tudydamian / tudy.tel
  • 4. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Session overview • A cybersecurity primer • The changing landscape – Social Engineering • What’s going on in cybersecurity lately? – Some of the latest threats, vulnerabilities, exploits and attack methods • If the demo gods are with us… – ARP poisoning – Credential harvesting – MFA bypass
  • 5. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals A cybersecurity primer
  • 6. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Window of Vulnerability - overview Vulnerability is discovered Exploit released in the wild Zero Day Attacks Vulnerability is known by the vendor Vulnerability disclosed publicly Security tools (IDS, antivirus) get updated Patch is published by vendor Existence of patch is widely known Patch is installed on affected systems
  • 7. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Window of Vulnerability - overview Vulnerability is discovered Exploit released in the wild Zero Day Attacks Vulnerability is known by the vendor Vulnerability disclosed publicly Security tools (IDS, antivirus) get updated Patch is published by vendor Existence of patch is widely known Patch is installed on affected systems This could take weeks, or even months
  • 8. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Essential elements of Information Security • A state of well-being of information and infrastructure in which the possibility of theft, tampering, and disruption of information and services is kept at low or tolerable levels Confidentiality • The assurance that the information is accessible only to those authorized to have access Integrity • The trustworthiness of data or resources in terms of preventing improper and unauthorized changes Availability • The assurance that the systems responsible for delivering, storing and processing information are accessible when required by the authorized users Authenticity • The characteristic of a communication, document or any data that ensures the quality of being genuine Non-repudiation • A guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message
  • 9. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals The underwear study ☺ Source: https://www.kaspersky.com/blog/passwords-are-like-underwear/10645/
  • 10. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Passwords are like underwear… • …change them often • …don’t leave them lying around • …don’t share them
  • 11. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Would you say that you have more pairs of underpants (panties, shorts) than passwords? The underwear study – question 1
  • 12. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Would you say that you have more pairs of underpants (panties, shorts) than passwords? The underwear study – question 1
  • 13. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Speaking about your underwear and your passwords, how often do you change them? The underwear study – question 2
  • 14. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Speaking about your underwear and your passwords, how often do you change them? The underwear study – question 2
  • 15. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Have you ever shared your underwear or password with a friend or member of your family? The underwear study – question 3
  • 16. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Have you ever shared your underwear or password with a friend or member of your family? The underwear study – question 3
  • 17. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals We won’t focus on everything… ☺ Personal Computer Security Passwords Social Engineering Identity Theft Email Security Safe Browsing Data Protection Encryption Physical Security Online Transactions Security Digital Signature & Certificates Data Backup Social Networking Antivirus Protection Disaster Recovery Internet Security Credit Card Frauds Monitoring Kids Online Wireless & Home Network Security Bluetooth Security Mobile Device Security OS Security Policies & Compliance …
  • 18. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals SOCIAL ENGINEERING
  • 19. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Who will win? Security tools Human error
  • 20. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals If an attacker sends an email to 100 people inside your company… …23 people will open it… …11 people will open the attachment… …and 6 of them will do so within the first hour Attacks happen fast and are hard to stop Source: Verizon Data Breach Report
  • 21. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Can we really ignore the human factor? • 55% of organizations were the target of successful cyber attacks over the course of a year • Around 84% of cyberattacks reported were due to human error –Failing to apply a patch, easy-to-guess passwords, phishing, etc. Source: https://www.computerweekly.com/news/450425184/Security-professionals-name-top-causes-of-breaches
  • 22. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Can we really ignore the human factor? • 42% percent of security breach victims feel they have to figure out the cause by themselves –52% will work with consultants or other outside help –Under 20% turn to colleagues for advice on data protection and risk mitigation Source: https://www.computerweekly.com/news/450425184/Security-professionals-name-top-causes-of-breaches
  • 23. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Can we really ignore the human factor? • Only 28% follow best practices by erasing and rebuilding a computer’s software after a potential malware attack –The others either manually erase the malware (46%) or rely on AV tools to identify and clean the malware (24%) Source: https://www.computerweekly.com/news/450425184/Security-professionals-name-top-causes-of-breaches
  • 24. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals You’ve already got social engineers out there • Psychologists • Lawyers • Governments • Salespeople • Recruiters • Spies • Scammers • Identity thieves • etc. ☺
  • 25. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals WHAT’S BEEN GOING ON LATELY?
  • 26. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals • Ransomware-as-a-Service (Karmen) • Router exploits allowing remote control (Cherry Blossom) • Data exfiltration via router leds (xLED) • Attacks on Bluetooth (BlueBorne) • Hacking phones via ultrasound (DolphinAttack) • Using HDD noise to steal data (DiskFiltration) • IoT Botnets (Mirai) • The ability to build your own BTS for less than 1000$ • Meltdown & Spectre • …and many, many more The past couple of years came with new threats
  • 27. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals …and we won’t go into details there either ☺ Equifax Apple Deloitte LinkedIn Sony VK.com Dropbox Amazon Yahoo Equation Group Shadow Brokers BlueBorne Ccleaner MySpace ExpensiveWall Dragonfly Punycode BadUSB Superfish Heartbleed Shellshock Karmen POODLE FREAK GHOST DROWN Dirty COW STAGEFRIGHT QuadRooter XCodeGhost Mirai Carbanak Gemalto SS7 Locky DMA Locker Surprise Ranscam SWIFT Weebly Sundown CrypMIC TrickBot Angler RIG Tumblr Neutrino xDedic BlackEnergy ProjectSauron Adwind Danti SVCMONDR Lazarus FruityArmor ScarCruft Lurk Ammyy Admin Chinastrats Patchwork TeslaCrypt WannaCry Petya NotPetya Ethereum LeakerLocker CouchPotato NanoCore RAT SambaCry Ropemaker
  • 28. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals ARP POISONING DEMO 1
  • 29. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals CREDENTIAL HARVESTING DEMO 2
  • 30. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals MFA BYPASS DEMO 3
  • 31. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals • No system is 100% secure – Anyone who thinks differently will eventually be proven wrong – Constantly find new ways to make it harder for you to be a target • Security hasn’t really been a priority in past years – The essential security elements are rarely looked into – This has affected the entire IT industry (web apps, OS-es, IoT, etc.) • When it comes to security, try not to look in the wrong place – It’s rarely about the technology, it’s often about the people – Social Engineering and insider threats are on the rise Things people need to be reminded of
  • 32. @ITCAMPRO #ITCAMP18Community Conference for IT Professionals Q & A