SlideShare ist ein Scribd-Unternehmen logo
1 von 34
International Congress and Convention Association #ICCAWorld#HoustonLaunch
About Cyber, GDPR
& You
Guy Golan, CEO Performanta
LinkedIn: https://www.linkedin.com/in/guygopurple/
guy.golan@performanta.com
Let’s start by asking few questions
VS
VS
VS
Your identity is not about who you are,
It is about protecting what I don’t want to lose
Why?
Ransomware: Sophisticated and Stupid
Wannacry
We are currently in the Wild West
Nation State
attacks
Organised
Crime
Industrial
Espionage
Hactivism
For Profit
For Cause
Cyber Criminals
• Might be as simple as money
• It can be your access
• Maybe your company’s IP
• Maybe your best friend’s business
• Your son’s best friend’s dad’s access to business
Bottom line: The bad guys will do whatever it takes to get to where they need to.
The bad guys have ulterior motive
What are the possible consequences?
• Have known keynote
• Concentrate all professionals in one place
• Easy to connect
• Easy to exploit / to target
• Would use as a vehicle for the next target
• Reconnaissance
• Very digital (Wi-Fi, cell phones, Apps)
Why events are a good target?
My digital footprint. Circles of exposure
Cyber Security is the true reflection of physical security.
Not always the other way around though!
Profiling – a story about Tanya
Your digital footprint?
Lateral Movement
colleague Target
Same System
Dwell time
Dwell Time
• Over 200 days
• Marriott’s was over 4 years!
• They collect information when you least expect it
The Web
WiFi
There is seriously a good chance that
you are just a means to an end
and/or collateral damage
Unique opportunity for you to think like a hacker!
• You have a big event in a convention centre
• The event is about tourism into a new destination
• Keynote – Minister of Tourism
• 50,000 delegates
• I want to make a statement and disrupt the keynote’s presentation
• Take 5 mins and write 5 steps to do that. Try be as chronological as possibly can.
• One more thing – believe that anything is possible!
The Cyber Kill Chain
Digital Footprint
Aviation brought us safety
How about Cyber Security?
What’s your password?
• Your Family member?
• Your name or last name?
• Important year?
• Big event?
• Pet?
• How many passwords do we have?
• Same password for different
applications?
• Write it somewhere?
• How about giving it to someone?
What do need to do?
Avoid Actions required
Avoid Actions required
Clicking
Temptation
Sharing for no reason
Awareness and vigilance
Password Management
Call back rather than respond
High profile
High exposure
White listing of people
Where you are
Awareness and vigilance
Children awareness
Cyber Bullying
Think beyond myself
Keeping it to yourself
Sharing because you trust
Be transparent if something went
wrong
What do need to do?
Summary – My company
• Great chance you’ve been hacked. If not it’s because you are not lucrative enough
• Business drive is critical – that’s the way you will protect your assets
• Know - People abuse data (Either maliciously or ‘just tried to do their job’)
• Scare tactics can only happen if you do not know what to protect
• Budget might be an issue. Spend the funds wisely
• Cost of breach would be 15x more than preventative measures
• Employ or nominate someone dedicated. Use the industry
• Great chance you’ve been hacked. If not it’s because you are not lucrative enough
Alignment to business must be natural
Summary – To Do
• Understand what you want to protect
• Bring security as close as possible to your business - alignment
• Build Cyber Strategy aligned with your business
• Demand protection:
• Secure registration
• Secure transfer of information
• Adherence to privacy regulations
• Adherence to payment regulations
• Segregation of duties
• Enforce protection / Engage with Cyber Experts
• Separate your back office from client facing activity
• Make sure WiFi is separated between participants and the organisers
Summary – Me and My Family
• Security is a topical mater in real life: me, my family, companies
• Think physical security. It will help you immensely
• Remember – it is not all about yourself
• Manage your passwords – Sentence long is great
• Never share your password
• Minimise your digital footprint
• Do not click on the link
• You did not just win $10m
• Call back is best
• Think beyond Yourself. There is impact on others close to you
Questions?
Provide your session feedback via
the ICCA Meetings App and
help us to shape next year’s
education programme!
Join the online
conversation with the
#ICCAWorld
#HoustonLaunch
International Congress and Convention Association #ICCAWorld#HoustonLaunch
International Congress and Convention Association #ICCAWorld#HoustonLaunch
Thank you!

Weitere ähnliche Inhalte

Ähnlich wie 58th ICCA Congress | Cyber Security

People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...Philip Calvert
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation211 Check
 
You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012jadedsecurity
 

Ähnlich wie 58th ICCA Congress | Cyber Security (20)

People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
Social Media and LinkedIn for IFAs and Financial Planners - Full-day workshop...
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 

Mehr von ICCA (International Congress and Convention Association)

Mehr von ICCA (International Congress and Convention Association) (20)

9_ICCA Meetings Association Africa Day_ICCA Association Community and Associa...
9_ICCA Meetings Association Africa Day_ICCA Association Community and Associa...9_ICCA Meetings Association Africa Day_ICCA Association Community and Associa...
9_ICCA Meetings Association Africa Day_ICCA Association Community and Associa...
 
8_ICCA Meetings Association Africa Day_The importance of good ethical practic...
8_ICCA Meetings Association Africa Day_The importance of good ethical practic...8_ICCA Meetings Association Africa Day_The importance of good ethical practic...
8_ICCA Meetings Association Africa Day_The importance of good ethical practic...
 
7_ICCA Meetings Association Africa Day_The importance of good ethical practic...
7_ICCA Meetings Association Africa Day_The importance of good ethical practic...7_ICCA Meetings Association Africa Day_The importance of good ethical practic...
7_ICCA Meetings Association Africa Day_The importance of good ethical practic...
 
6_ICCA Meetings Association Africa Day_Finance and Sponsorship for Nonprofit...
6_ICCA Meetings Association Africa Day_Finance and Sponsorship  for Nonprofit...6_ICCA Meetings Association Africa Day_Finance and Sponsorship  for Nonprofit...
6_ICCA Meetings Association Africa Day_Finance and Sponsorship for Nonprofit...
 
5_ICCA Meetings Association Africa Day_How funding & Sponsorship works_Dr. Ma...
5_ICCA Meetings Association Africa Day_How funding & Sponsorship works_Dr. Ma...5_ICCA Meetings Association Africa Day_How funding & Sponsorship works_Dr. Ma...
5_ICCA Meetings Association Africa Day_How funding & Sponsorship works_Dr. Ma...
 
4_ICCA Meetings Association Africa Day_The World's Greatest Show_Shaun Vorster
4_ICCA Meetings Association Africa Day_The World's Greatest Show_Shaun Vorster4_ICCA Meetings Association Africa Day_The World's Greatest Show_Shaun Vorster
4_ICCA Meetings Association Africa Day_The World's Greatest Show_Shaun Vorster
 
3_ICCA Meetings Association Africa Day_Best Cities Global Alliance_Lesley Wil...
3_ICCA Meetings Association Africa Day_Best Cities Global Alliance_Lesley Wil...3_ICCA Meetings Association Africa Day_Best Cities Global Alliance_Lesley Wil...
3_ICCA Meetings Association Africa Day_Best Cities Global Alliance_Lesley Wil...
 
2_ICCA Meetings Association Africa Day_Why should we be bidding and importanc...
2_ICCA Meetings Association Africa Day_Why should we be bidding and importanc...2_ICCA Meetings Association Africa Day_Why should we be bidding and importanc...
2_ICCA Meetings Association Africa Day_Why should we be bidding and importanc...
 
1_ICCA Meetings Association Africa Day_Global and Africa perspective_Esmare S...
1_ICCA Meetings Association Africa Day_Global and Africa perspective_Esmare S...1_ICCA Meetings Association Africa Day_Global and Africa perspective_Esmare S...
1_ICCA Meetings Association Africa Day_Global and Africa perspective_Esmare S...
 
ICCA Congress 2019 Sustainability Report
ICCA Congress 2019 Sustainability Report ICCA Congress 2019 Sustainability Report
ICCA Congress 2019 Sustainability Report
 
58th ICCA Congress | Achieving a winning sales & service performance culture
58th ICCA Congress | Achieving a winning sales & service performance culture58th ICCA Congress | Achieving a winning sales & service performance culture
58th ICCA Congress | Achieving a winning sales & service performance culture
 
Fyp19
Fyp19Fyp19
Fyp19
 
58th ICCA Congress | Ambassador Programme - The advanced edition - Steen Jako...
58th ICCA Congress | Ambassador Programme - The advanced edition - Steen Jako...58th ICCA Congress | Ambassador Programme - The advanced edition - Steen Jako...
58th ICCA Congress | Ambassador Programme - The advanced edition - Steen Jako...
 
58th ICCA Congress | Create your own events to profile your destination - Tra...
58th ICCA Congress | Create your own events to profile your destination - Tra...58th ICCA Congress | Create your own events to profile your destination - Tra...
58th ICCA Congress | Create your own events to profile your destination - Tra...
 
58th ICCA Congress | Pumps & Pipes: The Power of Cross-Boundary Collaboration
58th ICCA Congress | Pumps & Pipes: The Power of Cross-Boundary Collaboration58th ICCA Congress | Pumps & Pipes: The Power of Cross-Boundary Collaboration
58th ICCA Congress | Pumps & Pipes: The Power of Cross-Boundary Collaboration
 
58th ICCA Congress | Customer Excellence as key brand differentiator for dest...
58th ICCA Congress | Customer Excellence as key brand differentiator for dest...58th ICCA Congress | Customer Excellence as key brand differentiator for dest...
58th ICCA Congress | Customer Excellence as key brand differentiator for dest...
 
58th ICCA Congress | Every bid has a story
58th ICCA Congress | Every bid has a story58th ICCA Congress | Every bid has a story
58th ICCA Congress | Every bid has a story
 
58th ICCA Congress | Teaming without tantrums
58th ICCA Congress | Teaming without tantrums58th ICCA Congress | Teaming without tantrums
58th ICCA Congress | Teaming without tantrums
 
58th ICCA Congress | Evolution or revolution? Transforming tomorrow from clim...
58th ICCA Congress | Evolution or revolution? Transforming tomorrow from clim...58th ICCA Congress | Evolution or revolution? Transforming tomorrow from clim...
58th ICCA Congress | Evolution or revolution? Transforming tomorrow from clim...
 
58th ICCA Congress | Sponsorship in the digital age
58th ICCA Congress | Sponsorship in the digital age58th ICCA Congress | Sponsorship in the digital age
58th ICCA Congress | Sponsorship in the digital age
 

Kürzlich hochgeladen

Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 

Kürzlich hochgeladen (20)

Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 

58th ICCA Congress | Cyber Security

  • 1. International Congress and Convention Association #ICCAWorld#HoustonLaunch About Cyber, GDPR & You Guy Golan, CEO Performanta LinkedIn: https://www.linkedin.com/in/guygopurple/ guy.golan@performanta.com
  • 2. Let’s start by asking few questions VS VS VS
  • 3.
  • 4. Your identity is not about who you are, It is about protecting what I don’t want to lose
  • 5.
  • 8. We are currently in the Wild West Nation State attacks Organised Crime Industrial Espionage Hactivism For Profit For Cause
  • 10. • Might be as simple as money • It can be your access • Maybe your company’s IP • Maybe your best friend’s business • Your son’s best friend’s dad’s access to business Bottom line: The bad guys will do whatever it takes to get to where they need to. The bad guys have ulterior motive
  • 11. What are the possible consequences?
  • 12. • Have known keynote • Concentrate all professionals in one place • Easy to connect • Easy to exploit / to target • Would use as a vehicle for the next target • Reconnaissance • Very digital (Wi-Fi, cell phones, Apps) Why events are a good target?
  • 13. My digital footprint. Circles of exposure
  • 14. Cyber Security is the true reflection of physical security. Not always the other way around though!
  • 15. Profiling – a story about Tanya Your digital footprint?
  • 17. Dwell time Dwell Time • Over 200 days • Marriott’s was over 4 years! • They collect information when you least expect it
  • 19. WiFi
  • 20. There is seriously a good chance that you are just a means to an end and/or collateral damage
  • 21. Unique opportunity for you to think like a hacker! • You have a big event in a convention centre • The event is about tourism into a new destination • Keynote – Minister of Tourism • 50,000 delegates • I want to make a statement and disrupt the keynote’s presentation • Take 5 mins and write 5 steps to do that. Try be as chronological as possibly can. • One more thing – believe that anything is possible!
  • 22. The Cyber Kill Chain
  • 24. Aviation brought us safety How about Cyber Security?
  • 25. What’s your password? • Your Family member? • Your name or last name? • Important year? • Big event? • Pet? • How many passwords do we have? • Same password for different applications? • Write it somewhere? • How about giving it to someone?
  • 26. What do need to do? Avoid Actions required
  • 27. Avoid Actions required Clicking Temptation Sharing for no reason Awareness and vigilance Password Management Call back rather than respond High profile High exposure White listing of people Where you are Awareness and vigilance Children awareness Cyber Bullying Think beyond myself Keeping it to yourself Sharing because you trust Be transparent if something went wrong What do need to do?
  • 28. Summary – My company • Great chance you’ve been hacked. If not it’s because you are not lucrative enough • Business drive is critical – that’s the way you will protect your assets • Know - People abuse data (Either maliciously or ‘just tried to do their job’) • Scare tactics can only happen if you do not know what to protect • Budget might be an issue. Spend the funds wisely • Cost of breach would be 15x more than preventative measures • Employ or nominate someone dedicated. Use the industry • Great chance you’ve been hacked. If not it’s because you are not lucrative enough
  • 29. Alignment to business must be natural
  • 30. Summary – To Do • Understand what you want to protect • Bring security as close as possible to your business - alignment • Build Cyber Strategy aligned with your business • Demand protection: • Secure registration • Secure transfer of information • Adherence to privacy regulations • Adherence to payment regulations • Segregation of duties • Enforce protection / Engage with Cyber Experts • Separate your back office from client facing activity • Make sure WiFi is separated between participants and the organisers
  • 31. Summary – Me and My Family • Security is a topical mater in real life: me, my family, companies • Think physical security. It will help you immensely • Remember – it is not all about yourself • Manage your passwords – Sentence long is great • Never share your password • Minimise your digital footprint • Do not click on the link • You did not just win $10m • Call back is best • Think beyond Yourself. There is impact on others close to you
  • 33. Provide your session feedback via the ICCA Meetings App and help us to shape next year’s education programme! Join the online conversation with the #ICCAWorld #HoustonLaunch International Congress and Convention Association #ICCAWorld#HoustonLaunch
  • 34. International Congress and Convention Association #ICCAWorld#HoustonLaunch Thank you!

Hinweis der Redaktion

  1. Slide to use for introduction of panelists or subtopics
  2. Example of flight
  3. Asking about: Money in my wallet vs money in the bank Photos in my album vs photos on my phone / laptop Where I was exactly 7 years ago with my family vs Instagram or FB knowing it.
  4. Example of flight
  5. Please leave in PPT – will be shown while delegates walk in