SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Cybersecurity and Privacy on Internet
Katherine Cancelado
About me:
Katherine Cancelado
Consultant
Cyber Risk Services
Deloitte Dublin
Tel: +353 1417 5723
Email: kcancelado@deloitte.ie
Katherine is a Computer Science and Information Security Professional. She has always
been interested in technology with a particular focus on cyber security over the last
decade. She has over 3 years professional experience in penetration testing and
vulnerability assessment. Additionally, Katherine has over 3 years experience as a
network analyst, threat content creator and very recent experience in incident response
for a multitude of global companies.
Katherine lectured “Cyber Security“ at Javeriana University Colombia and has participated
in numerous infrastructure and application penetration testing assignments, including:
• Several web and network penetration tests for global organisations and financial
services within South America, United Kingdom and Ireland
• Worked as perimeter threat content creator for an American company in Colombia and
United Kingdom
• Penetration test, vulnerability assessment, incident response and forensics in the
financial sector of a “Big 4” firm
• Networking and system administration for an American company in Colombia
Qualifications
• MSc. In Cyber Security from “Universidad de
la Rioja” Madrid, Spain
• B.Eng. In Computer Science & Engineering
from “Universidad Pontificia Bolivariana”
Santander, Colombia
• System Security Certified Practitioner - (ISC)²
• Certified Digital Forensics Analyst – REDLIF
Main industries
• Bank, Financial and Insurance Companies
• IT and Telecommunication
• Education
Agenda
• Women at work
• Risks on Internet
• Privacy, Cybersecurity and Data Privacy
• What can you do?
• Questions
• References
Women
at Work
Women at Work
According to the United States Bureau of Labor
Statistics, 46.8% of professional positions are held
by women[1].
The table [2] on the right shows the different
percentages of women employed in each
professional sector.
Cyberjutsu[3], a non-profit passionate about helping
and empowering women to succeed in the
Cybersecurity field also offer an interesting statistic.
Only 11% of the information security workforce are
women.
The problem is not just the fact that women’s
representation in computer science related subjects
is low. It is that sometimes, the lack of computer
and information security awareness leaves women
vulnerable to cyber attack.
Therefore driving the voice around cybersecurity
and privacy, have never been more important for
ourselves and our female peers.
In the end, no matter what our role is, the data we
look after/ manage is what makes us an ideal
target.
Women and Internet Professional Occupation Women
Medical and health services 73.7%
Human resources 73.3%
Social and community service 67.4%
Education 65.7%
Public relationships and fundraising 59.2%
Advertising and promotions 53.6%
Lodging 53.5%
Property, real state, and community association 50.9%
Financial 49.6%
Administrative services 47.7%
Food services 47.1%
Purchasing 44.8%
Marketing and sales 43.2%
General and operations 27.6%
Computer and information systems 27.2%
Cybersecurity 11%
[1] https://www.bls.gov/cps/cpsaat11.htm
[2] https://www.bls.gov/opub/ted/2016/39-percent-of-managers-in-2015-were-women.htm
[3] http://womenscyberjutsu.org/
Information we manage
The information we hold
Personally Identifiable Information
PII is any information that can be used to identify a person; for example, your name, address,
date of birth, national insurance number, and so on.
Protected Health Information
PHI is defined by the Health Insurance Portability and Accountability Act (HIPPA) and
comprises any data that can be used to associate a person's identity with their health care
Financial Information
Banking/ transaction history, credit rating
Sensitive information:
National Insurance Number/ PPSN, driving license, financial accounts, medical information,
electoral record
Information is money!!!!
According to Breach Level Index[4],
data records have been found to be lost
or stolen at the following frequencies:
Every day: 4,504,712
Every hour: 187,696
Every minute: 3,218
Every second: 52
Even worse… Only 4% of these
breaches were ‘secure breaches’
(encryption was used and the stolen
data was rendered useless). 35.19%
15.46%
11.82%
11.46%
4.40%
3.48%
1.12%
Technology
Other
Retail
Government
Financial
Healthcare
Education
Data Records Stolen or Lost by Industry
[4] Data Breach level Index http://breachlevelindex.com/
8
Risks on
Internet
Risk on Internet
• Identity thief
• Phishing
• Fraud
Social Engineering
• Websites that appear to
be something they are
not. Phishing websites
• Obfuscation, masking,
iframes, clickjacking,
injections
Trojan websites
File sharing and privacy
• Viruses
• Spyware
• Adware
Malicious Software
Risk:
The likelihood of
“something bad”
happening and causing
financial and/ or
reputational damage
• Information Overshared
• Peer to Peer (P2P)
• Torrents
Cyber
Security
and
Privacy
What is Privacy?
[5] Privacy International – What is Privacy? https://www.privacyinternational.org/node/568
Cybersecurity and Data Privacy
Cybersecurity is the
conjunction of good
practices, tools, concepts and
measures taken to protect a
system, platform or person.
“Privacy is a fundamental
right, essential to autonomy
and the protection of human
dignity, serving as the
foundation upon which many
other human rights are built.”
[5]
[5] Privacy International – What is Privacy? https://www.privacyinternational.org/node/568
Cybersecurity and data privacy
are not the same, but should
always be together.
What
Can You
Do?
What Can You Do?
Personal
information is like
money
Value it
Protect it
Common sense Share with
care
Anonymise
your
Internet use
Check
Secure
Browsing
Classify your
data
Examine privacy
policies
Uninstall
unnecessary
software
Use
encryption
Not everything
is visible!
Remember that
the Internet is
an extension of
our “real” life
What Can You Do At Home?
Share with care
Do not reveal personal
information unnecessarily.
Terms & Conditions may not
apply to you. ;-)
02
01
Classify your data
All data is not equal. Treat
different life streams
separately; home/ work,
spouse/ children,
private/ public.
04
03
05
06
Anonymise your Internet
use
Stop sharing your location
and using add-ons.
Connect anonymously.
Uninstall unnecessary
software
Bloatware/ pre-installed or add-
on software (e.g. toolbars)
usually contains unwanted
processes and should be
removed.
Secure Browsing
Regularly clear your browser
history and cache, check for
secure connections (HTTPS).
Common sense
Always be aware of your
actions, a single click or tap
can have serious
consequences.
What Can You Do At work?
Do not take work to home
Physical and digital work
assets are a target outside
your place of work.
02
01
Remove unused software,
services
Limit use of software and
services to essentials.
04
03
05
06
End-to-End encryption
Ensure all start and
endpoints of electronic
communications are
encrypted to mitigate man-
in-the-middle attacks.
Document / Record
Everything
Ensure there’s a paper trail in
case something goes wrong.
Data retention
Comply with the law but
ensure useless data is
destroyed.
Think GDPR. 
Security Awareness
Give the appropriate
cybersecurity training to your
employees, ask about your
data management
expectations.
Questions?
“The art and science of asking questions is the source of
knowledge” - Thomas Berger
[1] https://www.bls.gov/cps/cpsaat11.htm
[2] https://www.bls.gov/opub/ted/2016/39-percent-of-managers-in-2015-were-women.htm
[3] http://womenscyberjutsu.org/
[4] Data Breach level Index http://breachlevelindex.com/
[5] Privacy International – What is Privacy? https://www.privacyinternational.org/node/568
References:

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Ivan Sang
 

Was ist angesagt? (20)

Security managment risks, controls and incidents
Security managment   risks, controls and incidentsSecurity managment   risks, controls and incidents
Security managment risks, controls and incidents
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Critical infrastructure
Critical infrastructureCritical infrastructure
Critical infrastructure
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cyber security
cyber security cyber security
cyber security
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
cyber security
cyber securitycyber security
cyber security
 

Ähnlich wie Cybersecurity and data privacy

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
Numaan Huq
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
Kristin Judge
 

Ähnlich wie Cybersecurity and data privacy (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 

Mehr von Katherine Cancelado (6)

WIA - Introduction to web application penetration testing
WIA - Introduction to web application penetration testingWIA - Introduction to web application penetration testing
WIA - Introduction to web application penetration testing
 
Redes y seguridad en AWS - CongresoSSI
Redes y seguridad en AWS - CongresoSSIRedes y seguridad en AWS - CongresoSSI
Redes y seguridad en AWS - CongresoSSI
 
Conferencia Honeynets - CongresoSSI
Conferencia Honeynets - CongresoSSIConferencia Honeynets - CongresoSSI
Conferencia Honeynets - CongresoSSI
 
Presentación Honeynets Universidad Libre
Presentación Honeynets Universidad Libre Presentación Honeynets Universidad Libre
Presentación Honeynets Universidad Libre
 
Honeynet para dar a luz perfiles de atacantes, CParty Colombia 2010
Honeynet para dar a luz perfiles de atacantes, CParty Colombia 2010 Honeynet para dar a luz perfiles de atacantes, CParty Colombia 2010
Honeynet para dar a luz perfiles de atacantes, CParty Colombia 2010
 
Opensolaris flisol
Opensolaris flisolOpensolaris flisol
Opensolaris flisol
 

Kürzlich hochgeladen

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

Cybersecurity and data privacy

  • 1. Cybersecurity and Privacy on Internet Katherine Cancelado
  • 2. About me: Katherine Cancelado Consultant Cyber Risk Services Deloitte Dublin Tel: +353 1417 5723 Email: kcancelado@deloitte.ie Katherine is a Computer Science and Information Security Professional. She has always been interested in technology with a particular focus on cyber security over the last decade. She has over 3 years professional experience in penetration testing and vulnerability assessment. Additionally, Katherine has over 3 years experience as a network analyst, threat content creator and very recent experience in incident response for a multitude of global companies. Katherine lectured “Cyber Security“ at Javeriana University Colombia and has participated in numerous infrastructure and application penetration testing assignments, including: • Several web and network penetration tests for global organisations and financial services within South America, United Kingdom and Ireland • Worked as perimeter threat content creator for an American company in Colombia and United Kingdom • Penetration test, vulnerability assessment, incident response and forensics in the financial sector of a “Big 4” firm • Networking and system administration for an American company in Colombia Qualifications • MSc. In Cyber Security from “Universidad de la Rioja” Madrid, Spain • B.Eng. In Computer Science & Engineering from “Universidad Pontificia Bolivariana” Santander, Colombia • System Security Certified Practitioner - (ISC)² • Certified Digital Forensics Analyst – REDLIF Main industries • Bank, Financial and Insurance Companies • IT and Telecommunication • Education
  • 3. Agenda • Women at work • Risks on Internet • Privacy, Cybersecurity and Data Privacy • What can you do? • Questions • References
  • 5. Women at Work According to the United States Bureau of Labor Statistics, 46.8% of professional positions are held by women[1]. The table [2] on the right shows the different percentages of women employed in each professional sector. Cyberjutsu[3], a non-profit passionate about helping and empowering women to succeed in the Cybersecurity field also offer an interesting statistic. Only 11% of the information security workforce are women. The problem is not just the fact that women’s representation in computer science related subjects is low. It is that sometimes, the lack of computer and information security awareness leaves women vulnerable to cyber attack. Therefore driving the voice around cybersecurity and privacy, have never been more important for ourselves and our female peers. In the end, no matter what our role is, the data we look after/ manage is what makes us an ideal target. Women and Internet Professional Occupation Women Medical and health services 73.7% Human resources 73.3% Social and community service 67.4% Education 65.7% Public relationships and fundraising 59.2% Advertising and promotions 53.6% Lodging 53.5% Property, real state, and community association 50.9% Financial 49.6% Administrative services 47.7% Food services 47.1% Purchasing 44.8% Marketing and sales 43.2% General and operations 27.6% Computer and information systems 27.2% Cybersecurity 11% [1] https://www.bls.gov/cps/cpsaat11.htm [2] https://www.bls.gov/opub/ted/2016/39-percent-of-managers-in-2015-were-women.htm [3] http://womenscyberjutsu.org/
  • 6. Information we manage The information we hold Personally Identifiable Information PII is any information that can be used to identify a person; for example, your name, address, date of birth, national insurance number, and so on. Protected Health Information PHI is defined by the Health Insurance Portability and Accountability Act (HIPPA) and comprises any data that can be used to associate a person's identity with their health care Financial Information Banking/ transaction history, credit rating Sensitive information: National Insurance Number/ PPSN, driving license, financial accounts, medical information, electoral record
  • 7. Information is money!!!! According to Breach Level Index[4], data records have been found to be lost or stolen at the following frequencies: Every day: 4,504,712 Every hour: 187,696 Every minute: 3,218 Every second: 52 Even worse… Only 4% of these breaches were ‘secure breaches’ (encryption was used and the stolen data was rendered useless). 35.19% 15.46% 11.82% 11.46% 4.40% 3.48% 1.12% Technology Other Retail Government Financial Healthcare Education Data Records Stolen or Lost by Industry [4] Data Breach level Index http://breachlevelindex.com/
  • 9. Risk on Internet • Identity thief • Phishing • Fraud Social Engineering • Websites that appear to be something they are not. Phishing websites • Obfuscation, masking, iframes, clickjacking, injections Trojan websites File sharing and privacy • Viruses • Spyware • Adware Malicious Software Risk: The likelihood of “something bad” happening and causing financial and/ or reputational damage • Information Overshared • Peer to Peer (P2P) • Torrents
  • 11. What is Privacy? [5] Privacy International – What is Privacy? https://www.privacyinternational.org/node/568
  • 12. Cybersecurity and Data Privacy Cybersecurity is the conjunction of good practices, tools, concepts and measures taken to protect a system, platform or person. “Privacy is a fundamental right, essential to autonomy and the protection of human dignity, serving as the foundation upon which many other human rights are built.” [5] [5] Privacy International – What is Privacy? https://www.privacyinternational.org/node/568 Cybersecurity and data privacy are not the same, but should always be together.
  • 14. What Can You Do? Personal information is like money Value it Protect it Common sense Share with care Anonymise your Internet use Check Secure Browsing Classify your data Examine privacy policies Uninstall unnecessary software Use encryption Not everything is visible! Remember that the Internet is an extension of our “real” life
  • 15. What Can You Do At Home? Share with care Do not reveal personal information unnecessarily. Terms & Conditions may not apply to you. ;-) 02 01 Classify your data All data is not equal. Treat different life streams separately; home/ work, spouse/ children, private/ public. 04 03 05 06 Anonymise your Internet use Stop sharing your location and using add-ons. Connect anonymously. Uninstall unnecessary software Bloatware/ pre-installed or add- on software (e.g. toolbars) usually contains unwanted processes and should be removed. Secure Browsing Regularly clear your browser history and cache, check for secure connections (HTTPS). Common sense Always be aware of your actions, a single click or tap can have serious consequences.
  • 16. What Can You Do At work? Do not take work to home Physical and digital work assets are a target outside your place of work. 02 01 Remove unused software, services Limit use of software and services to essentials. 04 03 05 06 End-to-End encryption Ensure all start and endpoints of electronic communications are encrypted to mitigate man- in-the-middle attacks. Document / Record Everything Ensure there’s a paper trail in case something goes wrong. Data retention Comply with the law but ensure useless data is destroyed. Think GDPR.  Security Awareness Give the appropriate cybersecurity training to your employees, ask about your data management expectations.
  • 17. Questions? “The art and science of asking questions is the source of knowledge” - Thomas Berger
  • 18.
  • 19. [1] https://www.bls.gov/cps/cpsaat11.htm [2] https://www.bls.gov/opub/ted/2016/39-percent-of-managers-in-2015-were-women.htm [3] http://womenscyberjutsu.org/ [4] Data Breach level Index http://breachlevelindex.com/ [5] Privacy International – What is Privacy? https://www.privacyinternational.org/node/568 References: