SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Webinar 3:
Cybersecurity /
Coronavirus Homeworking
Challenge
Programme
 Introduction by Toon Vanagt
 Fintech industry: A reliable partner
for the financial sector by Professor
Georges Ataya
o Case studies
o What methods should be put in place?
o The skills that are lacking
o Certifications
Your Speakers
Georges Ataya
Academic Director at Solvay Brussels School
Managing partner Ataya & partner
Co-Founder of the Belgian Cybersecurity Coalition
Co-founder DPO Circle
Member of the Advisory Boards at Agoria, BECI, CIONET,
ISACA
Past International Vice President at ISACA and co-
founder of the body of knowledge of CISM and CGEIT
Toon Vanagt
Host, Board of FinTech Belgium
CEO of data.be
Cybersecurity context
Fintech concerns for Cybersecurity
European regulations and guidelines
Certification for SME
Cybersecurity skills assessment
Competences and knowledge
Professional certification
Cybersecurity
for FINTECH
Prof. Georges Ataya
Urgent Cyber Security Issues
1. Financial Crimes
2.The Rise of Multi-Cloud Computing
3. Third-Party and Supply Chain Attacks
4. Shortage of Cybersecurity Professionals
5. More Sophisticated Phishing Exploits
6. Cyber Attacks on the Grid
7. Personal Attacks
8. State-Sponsored Attacks
9. IoT and Autonomous Systems
10. Smart Health Devices and EMR
“Cyber crime is big
business, with the most
elite hackers earning a cool
half a million dollars a
year just to test system
security; the bad guys are
raking in billions”.
Source: www.csoonline.com
The 14 biggest data breaches of the 21st
century
Adobe
Date: October 2013
Impact: 153 million user records
Adult Friend Finder
Date: October 2016
Impact: 412.2 million accounts
Canva
Date: May 2019
Impact: 137 million user accounts
eBay
Date: May 2014
Impact: 145 million users
Equifax
Date: July 29, 2017
Impact: 147.9 million consumers
LinkedIn
Date: 2012 (and 2016)
Impact: 165 million user accounts
Marriott International
Date: 2014-18
Impact: 500 million customers
Yahoo
Date: 2013-14
Impact: 3 billion user accounts
Sources of external threat
Intelligence
Agencies
Criminal
Groups
Terrorist
Groups
Activist
Groups
Armed
Forces
7
The fact that there’re many cases in which large
traditional banks have failed to protect the data of
their customers do not imply that Fintech is better
than other financial institutions
Source: FSBT.TECH (Open API Platform)
A report by PWC indicates that it is easy for the new
banks to focus on securing the activities of their
clients on their systems than for large conventional
banks.
EU RegulationseIDAS
setting the security and notification
requirements for digital service providers and
build national capabilities
help to manage digital identities by providing
online trust and allows citizens and business to
use national eID and trust services across borders
gives control to individuals over their personal
data and to simplify the regulatory
environment for international business
eIDAS
framework for European Cybersecurity
Certificates for products, processes and
services that will be valid throughout the EU
Cyber Security Coalition & CCB Elements of the scheme
Page 13
Cybersecurity Fundamentals for SME
Plan your cyber security
• Understand the enterprise context
• Management commitment
• Training, communication and awareness
• Custom made or internally developed software and hardware
• Incident management basics
Manage risks for your most important assets
• Inventory of IT devices
• Risk management (Predefined)
• Information classification and handling (minimum mores)
• Backups and Restore
Cybersecurity Technical measures
• Firewalls
• Secured configuration
• User access controls
• Malware
• Patch management
• Email Security
https://cyberguide.ccb.belgium.be/en
Cyber Security Coalition & CCB Elements of the scheme
Page 14
Cybersecurity Fundamentals for SME
https://cyberguide.ccb.belgium.be/en
Project 1 Project 2 Project 3 Project 4 Project 5
Self-assessment
questionnaire &
tool
Promotion &
Communication
Advice
Development
Labelling
Currently on hold
Registry of
specialists &
solution providers
Awareness Campaigns
15
Cybersecurity
Awareness
Corporate and general Management
Application Development
Business managers and Users
IT Professionals
Information Security Professionals
Awareness Classes
Incident Management
Guide
16
Rising risks in the digital economy
Building higher defensive walls and
installing defense-in-depth solutions
© Copyright ICTC.EU 2017© 2017 ICT Control NV SA - No reproduction or reuse 18
Source ISACA.ORG 19
What level of
protection do
we need?
IDENTIFY
DETECT
PROTECT
RESPOND
Cybersecurity processes
20
RECOVER © 2015 ICTC.EU
IDENTIFY
DETECT
PROTECT
RECOVER
RESPOND
Functions
Develop and implement
Cybersecurity processes
21
DETECT
DE.AE-5: Incident alert
thresholds are established
DE.AE-1
DE.AE-2
DE.AE-3
DE.AE-4
• COBIT 5 APO12.06
• ISA 62443-2-1:2009 4.2.3.10
• NIST SP 800-53 Rev. 4 IR-4, IR-5, IR-8
Anomalies and Events (DE.AE):
Anomalous activity is detected
in a timely manner and the
potential impact of events is
understood.
© 2015 ICTC.EU
22© 2017 ICT Control NV SA - No reproduction or reuse
The need for good business
practices
24
A MANAGER FOR CYBER SECURITY
PROTECTION and INCIDENT MANAGEMENT
Information Security Governance
Information Security Incident
Management
Information Security Program
Development & Management
Information Risk Management
& Compliance
SHORTAGES OF DIGITAL PROFESSIONALS
10 avril 2020 ©2020 Ataya & Partners. All Rights Reserved 25
TECH TRENDS WITH STAFFING NEEDS
Machine learning; Big data
Blockchain
Digital transformation
Cyber security; IoT security;
Cloud; Privacy by design
3D printing
Agile and a DevOps;
Technical debt and legacy debt
Various sources
INFORMATION SECURITY PROFESSIONS
1. App security engineer
2. Cyber security consultant
3. Data protection officer
4. Chief security officer
5. Security analyst
6. Security engineer
7. Security architect
8. Security and penetration testing expert
Source: esecurityplanet.com
CYBERSECURITY PROFESSIONS
1. Ethical hacker
2. Information Security Analyst
3. Penetration Tester/Vulnerability Analyst
4. Digital Forensic Analyst
5. Security Software Developer
6. Chief Information Security Officer (CISO)
7. Network Engineer/Security Architect
8. Incident Handler
source: eccouncil.org
26
ASSESSMENT OF
SKILLS
IN
DIGITAL GOVERNANCE,
TECHNOLOGY, AND
TRUST
Academy.atayapartners.com/fintech-sessions
DREAM. LEARN. LEAD.
• THANKS
Full online Education
Starting in April 2020
S2 (CISSP preparation)
G2 (COBIT 2019)
B2 (Data Management)
M2 (Application development)
April and
May 2020
28Academy.atayapartners.com/fintech-sessions
Graduation photo Trusted Fintech Program 2018-2019
//academy.atayapartners.com
Academy.atayapartners.com/fintech-sessions
Georges Ataya
Professor, founder and Academic Director of Digital and information
security management at SBS-EM
Co-Fouder of the Belgian Cybersecurity Coalition
Co-founder DPO Circle
Member of the Advisory Board: Agoria, BECI, CIONET, ISACA, belgian
Cybersecurity Coalition
Managing Director ICT Control advisory firm
Founded IT Management Academy
Past International Vice President at ISACA
Past Partner Ernst & Young
Past Deputy International CIO ITT World Directories
Previously Project Manager and Senior IT Auditor
Linkedin: ataya
Academy.atayapartners.com/fintech-sessions
• NEXT FRIDAY AT 14PM:
Webinar: Financial crisis survival / Coronavirus
Homeworking Challenge
• NEXT THURSDAY APRIL 23rd:
Digital Classroom: How to become and stay
licensed in Belgium?, April 23rd from 2pm to
6pm, in collaboration with Febelfin Academy

Weitere ähnliche Inhalte

Was ist angesagt?

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for ComeosBart Van Den Brande
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesOlivier Busolini
 
SMi Group's Benelux Infrastructure Forum 2019
SMi Group's Benelux Infrastructure Forum 2019SMi Group's Benelux Infrastructure Forum 2019
SMi Group's Benelux Infrastructure Forum 2019Dale Butler
 
IoT Security Foundation launch 23 Sept 2015 16-9ratio
IoT Security Foundation launch 23 Sept 2015 16-9ratioIoT Security Foundation launch 23 Sept 2015 16-9ratio
IoT Security Foundation launch 23 Sept 2015 16-9ratioJohn Moor
 
Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015Jane Lambert
 
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)Andris Soroka
 
PCI in the Contact Centre
PCI in the Contact CentrePCI in the Contact Centre
PCI in the Contact CentresilverliningUK
 
Indjic fintech module 2
Indjic fintech module 2Indjic fintech module 2
Indjic fintech module 2Drago Indjic
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceDale Butler
 
Fintech Belgium Summit 2017 - Blockchain - KBC - by Koen Vingerhoets
Fintech Belgium Summit 2017 - Blockchain - KBC - by  Koen VingerhoetsFintech Belgium Summit 2017 - Blockchain - KBC - by  Koen Vingerhoets
Fintech Belgium Summit 2017 - Blockchain - KBC - by Koen VingerhoetsFinTech Belgium
 
Guardomic: EOSC-hub week demo (Prague)
Guardomic: EOSC-hub week demo (Prague)Guardomic: EOSC-hub week demo (Prague)
Guardomic: EOSC-hub week demo (Prague)EOSC-hub project
 

Was ist angesagt? (14)

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial Services
 
SMi Group's Benelux Infrastructure Forum 2019
SMi Group's Benelux Infrastructure Forum 2019SMi Group's Benelux Infrastructure Forum 2019
SMi Group's Benelux Infrastructure Forum 2019
 
IoT Security Foundation launch 23 Sept 2015 16-9ratio
IoT Security Foundation launch 23 Sept 2015 16-9ratioIoT Security Foundation launch 23 Sept 2015 16-9ratio
IoT Security Foundation launch 23 Sept 2015 16-9ratio
 
Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015
 
MOBES project
MOBES projectMOBES project
MOBES project
 
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
 
PCI in the Contact Centre
PCI in the Contact CentrePCI in the Contact Centre
PCI in the Contact Centre
 
NCVO/Zurich webinar: Safeguarding through covid-19 and beyond
NCVO/Zurich webinar: Safeguarding through covid-19 and beyondNCVO/Zurich webinar: Safeguarding through covid-19 and beyond
NCVO/Zurich webinar: Safeguarding through covid-19 and beyond
 
Indjic fintech module 2
Indjic fintech module 2Indjic fintech module 2
Indjic fintech module 2
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
Fintech Belgium Summit 2017 - Blockchain - KBC - by Koen Vingerhoets
Fintech Belgium Summit 2017 - Blockchain - KBC - by  Koen VingerhoetsFintech Belgium Summit 2017 - Blockchain - KBC - by  Koen Vingerhoets
Fintech Belgium Summit 2017 - Blockchain - KBC - by Koen Vingerhoets
 
Guardomic: EOSC-hub week demo (Prague)
Guardomic: EOSC-hub week demo (Prague)Guardomic: EOSC-hub week demo (Prague)
Guardomic: EOSC-hub week demo (Prague)
 

Ähnlich wie Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge - 03-04-20

SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceDale Butler
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...TelecomValley
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfSeasiaInfotech2
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxkoushikichakraborty3
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023The Digital Insurer
 

Ähnlich wie Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge - 03-04-20 (20)

SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
 

Mehr von FinTech Belgium

06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptxFinTech Belgium
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptxFinTech Belgium
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptxFinTech Belgium
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdfFinTech Belgium
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptxFinTech Belgium
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptxFinTech Belgium
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdfFinTech Belgium
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFinTech Belgium
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptxFinTech Belgium
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptxFinTech Belgium
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptxFinTech Belgium
 
AMS_01_Rie_.De Sordo Cock pptx
AMS_01_Rie_.De Sordo Cock           pptxAMS_01_Rie_.De Sordo Cock           pptx
AMS_01_Rie_.De Sordo Cock pptxFinTech Belgium
 
AMS_00 FTBE_0126_2024. .pptx
AMS_00 FTBE_0126_2024.             .pptxAMS_00 FTBE_0126_2024.             .pptx
AMS_00 FTBE_0126_2024. .pptxFinTech Belgium
 
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfS5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfFinTech Belgium
 
S5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptxS5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptxFinTech Belgium
 

Mehr von FinTech Belgium (20)

06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptx
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptx
 
AMS_01_Rie_.De Sordo Cock pptx
AMS_01_Rie_.De Sordo Cock           pptxAMS_01_Rie_.De Sordo Cock           pptx
AMS_01_Rie_.De Sordo Cock pptx
 
AMS_00 FTBE_0126_2024. .pptx
AMS_00 FTBE_0126_2024.             .pptxAMS_00 FTBE_0126_2024.             .pptx
AMS_00 FTBE_0126_2024. .pptx
 
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfS5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
 
S5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptxS5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptx
 

Kürzlich hochgeladen

High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxhiddenlevers
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceanilsa9823
 

Kürzlich hochgeladen (20)

High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
 

Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge - 03-04-20

  • 2. Programme  Introduction by Toon Vanagt  Fintech industry: A reliable partner for the financial sector by Professor Georges Ataya o Case studies o What methods should be put in place? o The skills that are lacking o Certifications
  • 3. Your Speakers Georges Ataya Academic Director at Solvay Brussels School Managing partner Ataya & partner Co-Founder of the Belgian Cybersecurity Coalition Co-founder DPO Circle Member of the Advisory Boards at Agoria, BECI, CIONET, ISACA Past International Vice President at ISACA and co- founder of the body of knowledge of CISM and CGEIT Toon Vanagt Host, Board of FinTech Belgium CEO of data.be
  • 4. Cybersecurity context Fintech concerns for Cybersecurity European regulations and guidelines Certification for SME Cybersecurity skills assessment Competences and knowledge Professional certification Cybersecurity for FINTECH Prof. Georges Ataya
  • 5.
  • 6. Urgent Cyber Security Issues 1. Financial Crimes 2.The Rise of Multi-Cloud Computing 3. Third-Party and Supply Chain Attacks 4. Shortage of Cybersecurity Professionals 5. More Sophisticated Phishing Exploits 6. Cyber Attacks on the Grid 7. Personal Attacks 8. State-Sponsored Attacks 9. IoT and Autonomous Systems 10. Smart Health Devices and EMR “Cyber crime is big business, with the most elite hackers earning a cool half a million dollars a year just to test system security; the bad guys are raking in billions”. Source: www.csoonline.com The 14 biggest data breaches of the 21st century Adobe Date: October 2013 Impact: 153 million user records Adult Friend Finder Date: October 2016 Impact: 412.2 million accounts Canva Date: May 2019 Impact: 137 million user accounts eBay Date: May 2014 Impact: 145 million users Equifax Date: July 29, 2017 Impact: 147.9 million consumers LinkedIn Date: 2012 (and 2016) Impact: 165 million user accounts Marriott International Date: 2014-18 Impact: 500 million customers Yahoo Date: 2013-14 Impact: 3 billion user accounts
  • 7. Sources of external threat Intelligence Agencies Criminal Groups Terrorist Groups Activist Groups Armed Forces 7
  • 8. The fact that there’re many cases in which large traditional banks have failed to protect the data of their customers do not imply that Fintech is better than other financial institutions Source: FSBT.TECH (Open API Platform) A report by PWC indicates that it is easy for the new banks to focus on securing the activities of their clients on their systems than for large conventional banks.
  • 9.
  • 11. setting the security and notification requirements for digital service providers and build national capabilities help to manage digital identities by providing online trust and allows citizens and business to use national eID and trust services across borders gives control to individuals over their personal data and to simplify the regulatory environment for international business eIDAS framework for European Cybersecurity Certificates for products, processes and services that will be valid throughout the EU
  • 12.
  • 13. Cyber Security Coalition & CCB Elements of the scheme Page 13 Cybersecurity Fundamentals for SME Plan your cyber security • Understand the enterprise context • Management commitment • Training, communication and awareness • Custom made or internally developed software and hardware • Incident management basics Manage risks for your most important assets • Inventory of IT devices • Risk management (Predefined) • Information classification and handling (minimum mores) • Backups and Restore Cybersecurity Technical measures • Firewalls • Secured configuration • User access controls • Malware • Patch management • Email Security https://cyberguide.ccb.belgium.be/en
  • 14. Cyber Security Coalition & CCB Elements of the scheme Page 14 Cybersecurity Fundamentals for SME https://cyberguide.ccb.belgium.be/en Project 1 Project 2 Project 3 Project 4 Project 5 Self-assessment questionnaire & tool Promotion & Communication Advice Development Labelling Currently on hold Registry of specialists & solution providers
  • 16. Cybersecurity Awareness Corporate and general Management Application Development Business managers and Users IT Professionals Information Security Professionals Awareness Classes Incident Management Guide 16
  • 17. Rising risks in the digital economy
  • 18. Building higher defensive walls and installing defense-in-depth solutions © Copyright ICTC.EU 2017© 2017 ICT Control NV SA - No reproduction or reuse 18
  • 19. Source ISACA.ORG 19 What level of protection do we need?
  • 22. DETECT DE.AE-5: Incident alert thresholds are established DE.AE-1 DE.AE-2 DE.AE-3 DE.AE-4 • COBIT 5 APO12.06 • ISA 62443-2-1:2009 4.2.3.10 • NIST SP 800-53 Rev. 4 IR-4, IR-5, IR-8 Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the potential impact of events is understood. © 2015 ICTC.EU 22© 2017 ICT Control NV SA - No reproduction or reuse The need for good business practices
  • 23.
  • 24. 24 A MANAGER FOR CYBER SECURITY PROTECTION and INCIDENT MANAGEMENT Information Security Governance Information Security Incident Management Information Security Program Development & Management Information Risk Management & Compliance
  • 25. SHORTAGES OF DIGITAL PROFESSIONALS 10 avril 2020 ©2020 Ataya & Partners. All Rights Reserved 25 TECH TRENDS WITH STAFFING NEEDS Machine learning; Big data Blockchain Digital transformation Cyber security; IoT security; Cloud; Privacy by design 3D printing Agile and a DevOps; Technical debt and legacy debt Various sources INFORMATION SECURITY PROFESSIONS 1. App security engineer 2. Cyber security consultant 3. Data protection officer 4. Chief security officer 5. Security analyst 6. Security engineer 7. Security architect 8. Security and penetration testing expert Source: esecurityplanet.com CYBERSECURITY PROFESSIONS 1. Ethical hacker 2. Information Security Analyst 3. Penetration Tester/Vulnerability Analyst 4. Digital Forensic Analyst 5. Security Software Developer 6. Chief Information Security Officer (CISO) 7. Network Engineer/Security Architect 8. Incident Handler source: eccouncil.org
  • 26. 26 ASSESSMENT OF SKILLS IN DIGITAL GOVERNANCE, TECHNOLOGY, AND TRUST Academy.atayapartners.com/fintech-sessions
  • 27. DREAM. LEARN. LEAD. • THANKS Full online Education Starting in April 2020 S2 (CISSP preparation) G2 (COBIT 2019) B2 (Data Management) M2 (Application development) April and May 2020
  • 30. Georges Ataya Professor, founder and Academic Director of Digital and information security management at SBS-EM Co-Fouder of the Belgian Cybersecurity Coalition Co-founder DPO Circle Member of the Advisory Board: Agoria, BECI, CIONET, ISACA, belgian Cybersecurity Coalition Managing Director ICT Control advisory firm Founded IT Management Academy Past International Vice President at ISACA Past Partner Ernst & Young Past Deputy International CIO ITT World Directories Previously Project Manager and Senior IT Auditor Linkedin: ataya Academy.atayapartners.com/fintech-sessions
  • 31.
  • 32. • NEXT FRIDAY AT 14PM: Webinar: Financial crisis survival / Coronavirus Homeworking Challenge • NEXT THURSDAY APRIL 23rd: Digital Classroom: How to become and stay licensed in Belgium?, April 23rd from 2pm to 6pm, in collaboration with Febelfin Academy

Hinweis der Redaktion

  1. When watching the trends and the extent of attacks, we understand the need for securiting the logic of our processes, the essence of how we do business.
  2. The motives behind most APTs are as old as civilization itself: espionage, sabotage, crime, terrorism, warfare, protest and vandalism. Such threats are familiar to everybody, although their physical manifestations are generally beyond the everyday work experiences of most citizens and company staff. The average person rarely encounters spies, criminals or hackers when going about his/her business, but networks are bringing such threats much closer to home.
  3. Abundant Regulations seek to bring organisation to new level of basic security
  4. It is not a secret that the complexity of our business processes, the multitude of diverse technologies and the absence of homogeneity of our architecture constitute major vulnerabilities On the other hand, the expansion of cyber criminal activities, the demanding requirements of various regulations and the demand for improved services increase on their turn the need for more effort required to deliver up to expectations.
  5. Roundel in Fort de Salses (southern France), 15th century, drawing byViollet-le-Duc Today, cybersecurity now needs to be addressed in a more holistic manner. Building higher defensive walls and installing defense-in-depth solutions are no longer sufficient to prevent criminal intrusions and compromise. Today, many organisations still put all their faith in annual intrusion tests run with external consultants, with little regards to the complexity of the enterprise system.
  6. Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
  7. Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
  8. The CISO function evolves as new management methods and threats landscape require different skills and capabilities.