Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 34 Anzeige

58th ICCA Congress | Cyber Security

Herunterladen, um offline zu lesen

The Information Age has been marked by data privacy scandals and resulting landmark legislation: the implementation of GDPR, mass data leaks, Cambridge Analytica and numerous hacking incidents have taught governments and global corporate entities that cybersecurity is paramount. How are you protecting the data of your clients, consumers and users? Join this session to update yourself on the latest thinking in the field with expertise from Guy Golan, renowned cyber security and privacy expert and corporate governance specialist. More details to follow.

The Information Age has been marked by data privacy scandals and resulting landmark legislation: the implementation of GDPR, mass data leaks, Cambridge Analytica and numerous hacking incidents have taught governments and global corporate entities that cybersecurity is paramount. How are you protecting the data of your clients, consumers and users? Join this session to update yourself on the latest thinking in the field with expertise from Guy Golan, renowned cyber security and privacy expert and corporate governance specialist. More details to follow.

Anzeige
Anzeige

Weitere Verwandte Inhalte

Ähnlich wie 58th ICCA Congress | Cyber Security (20)

Weitere von ICCA (International Congress and Convention Association) (20)

Anzeige
Anzeige

58th ICCA Congress | Cyber Security

  1. 1. International Congress and Convention Association #ICCAWorld#HoustonLaunch About Cyber, GDPR & You Guy Golan, CEO Performanta LinkedIn: https://www.linkedin.com/in/guygopurple/ guy.golan@performanta.com
  2. 2. Let’s start by asking few questions VS VS VS
  3. 3. Your identity is not about who you are, It is about protecting what I don’t want to lose
  4. 4. Why?
  5. 5. Ransomware: Sophisticated and Stupid Wannacry
  6. 6. We are currently in the Wild West Nation State attacks Organised Crime Industrial Espionage Hactivism For Profit For Cause
  7. 7. Cyber Criminals
  8. 8. • Might be as simple as money • It can be your access • Maybe your company’s IP • Maybe your best friend’s business • Your son’s best friend’s dad’s access to business Bottom line: The bad guys will do whatever it takes to get to where they need to. The bad guys have ulterior motive
  9. 9. What are the possible consequences?
  10. 10. • Have known keynote • Concentrate all professionals in one place • Easy to connect • Easy to exploit / to target • Would use as a vehicle for the next target • Reconnaissance • Very digital (Wi-Fi, cell phones, Apps) Why events are a good target?
  11. 11. My digital footprint. Circles of exposure
  12. 12. Cyber Security is the true reflection of physical security. Not always the other way around though!
  13. 13. Profiling – a story about Tanya Your digital footprint?
  14. 14. Lateral Movement colleague Target Same System
  15. 15. Dwell time Dwell Time • Over 200 days • Marriott’s was over 4 years! • They collect information when you least expect it
  16. 16. The Web
  17. 17. WiFi
  18. 18. There is seriously a good chance that you are just a means to an end and/or collateral damage
  19. 19. Unique opportunity for you to think like a hacker! • You have a big event in a convention centre • The event is about tourism into a new destination • Keynote – Minister of Tourism • 50,000 delegates • I want to make a statement and disrupt the keynote’s presentation • Take 5 mins and write 5 steps to do that. Try be as chronological as possibly can. • One more thing – believe that anything is possible!
  20. 20. The Cyber Kill Chain
  21. 21. Digital Footprint
  22. 22. Aviation brought us safety How about Cyber Security?
  23. 23. What’s your password? • Your Family member? • Your name or last name? • Important year? • Big event? • Pet? • How many passwords do we have? • Same password for different applications? • Write it somewhere? • How about giving it to someone?
  24. 24. What do need to do? Avoid Actions required
  25. 25. Avoid Actions required Clicking Temptation Sharing for no reason Awareness and vigilance Password Management Call back rather than respond High profile High exposure White listing of people Where you are Awareness and vigilance Children awareness Cyber Bullying Think beyond myself Keeping it to yourself Sharing because you trust Be transparent if something went wrong What do need to do?
  26. 26. Summary – My company • Great chance you’ve been hacked. If not it’s because you are not lucrative enough • Business drive is critical – that’s the way you will protect your assets • Know - People abuse data (Either maliciously or ‘just tried to do their job’) • Scare tactics can only happen if you do not know what to protect • Budget might be an issue. Spend the funds wisely • Cost of breach would be 15x more than preventative measures • Employ or nominate someone dedicated. Use the industry • Great chance you’ve been hacked. If not it’s because you are not lucrative enough
  27. 27. Alignment to business must be natural
  28. 28. Summary – To Do • Understand what you want to protect • Bring security as close as possible to your business - alignment • Build Cyber Strategy aligned with your business • Demand protection: • Secure registration • Secure transfer of information • Adherence to privacy regulations • Adherence to payment regulations • Segregation of duties • Enforce protection / Engage with Cyber Experts • Separate your back office from client facing activity • Make sure WiFi is separated between participants and the organisers
  29. 29. Summary – Me and My Family • Security is a topical mater in real life: me, my family, companies • Think physical security. It will help you immensely • Remember – it is not all about yourself • Manage your passwords – Sentence long is great • Never share your password • Minimise your digital footprint • Do not click on the link • You did not just win $10m • Call back is best • Think beyond Yourself. There is impact on others close to you
  30. 30. Questions?
  31. 31. Provide your session feedback via the ICCA Meetings App and help us to shape next year’s education programme! Join the online conversation with the #ICCAWorld #HoustonLaunch International Congress and Convention Association #ICCAWorld#HoustonLaunch
  32. 32. International Congress and Convention Association #ICCAWorld#HoustonLaunch Thank you!

Hinweis der Redaktion

  • Slide to use for introduction of panelists or subtopics
  • Example of flight
  • Asking about:
    Money in my wallet vs money in the bank
    Photos in my album vs photos on my phone / laptop
    Where I was exactly 7 years ago with my family vs Instagram or FB knowing it.
  • Example of flight
  • Please leave in PPT – will be shown while delegates walk in

×