SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•AIPSI, ASSOCIAZIONE ITALIANA PROFESSIONISTI SICUREZZA
INFORMATICA, CAPITOLO ITALIANO DI ISSA, INFORMATION SYSTEMS
SECURITY ASSOCIATION, (WWW.ISSA.ORG) CHE CONTA >>10.000 SOCI,
LA PIÙ GRANDE ASSOCIAZIONE NON-PROFIT DI PROFESSIONISTI DELLA
SICUREZZA ICT NEL MONDO
•AIPSI È IL PUNTO DI AGGREGAZIONE SUL TERRITORIO E DI
TRASFERIMENTO DI KNOW-HOW PER I PROFESSIONISTI DELLA SICUREZZA
DIGITALE, SIA DIPENDENTI SIA LIBERI PROFESSIONISTI ED IMPRENDITORI
DEL SETTORE
•SEDE CENTRALE: MILANO
•SEDI TERRITORIALI : ANCONA-MACERATA, LECCE, TORINO, VERONA-
VENEZIA
•CONTATTI: AIPSI@AIPSI.ORG, SEGRETERIA@AIPSI.ORG
Siamo presenti
per tutti i 3 giorni
di SMAU nella
Area
Community ICT
VIENI A
TROVARCI !
2
• AIUTARE I PROPRI SOCI NELLA CRESCITA PROFESSIONALE E QUINDI NELLA CRESCITA
DEL LORO BUSINESS
• OFFRIRE AI PROPRI SOCI SERVIZI QUALIFICATI PER TALE CRESCITA, CHE INCLUDONO
• CONVEGNI, WORKSHOP, WEBINAR SIA A LIVELLO NAZIONALE CHE
INTERNAZIONALE VIA ISSA
• RAPPORTI ANNUALI E SPECIFICI OAD, OSSERVATORIO ATTACCHI
DIGITALI IN ITALIA NEL NUOVO SITO HTTPS://WWW.OADWEB.IT
• SUPPORTO NELL’INTERO CICLO DI VITA PROFESSIONALE
• FORMAZIONE SPECIALIZZATA E SUPPORTO ALLE CERTIFICAZIONI, IN
PARTICOLARE ECF PLUS (EN 16234-1:2016, IN ITALIA UNI 11506)
• RAPPORTI CON ALTRI SOCI A LIVELLO NAZIONALE (AIPSI) ED INTERNAZIONALI
(ISSA)
• CONTRIBUIRE ALLA DIFFUSIONE DELLA CULTURA E ALLA SENSIBILIZZAZIONE PER LA
SICUREZZA DIGITALE
• COLLABORAZIONE CON VARIE ASSOCIAZIONI ED ENTI PER EVENTI ED INIZIATIVE
CONGIUNTE
Creazione del
Gruppo di lavoro
CSWI,
Cyber Security
Women’s Italy,
aperto anche alle
Signore non Socie
AIPSI
3
A breve disponibile il
nuovo
Rapporto 2018 OAD
UTM SECURITY APPLIANCES
Unified Threat Management
Next Generation Firewall (NGFW)
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
NGFW / UTM
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
authentication systems or methods are based on one or more of these five factors:
•
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
Another method that is becoming popular is out-of-band authentication.
This is a process whereby the system you are authenticating gets information from public
records and asks you questions to help authenticate you.
For example, the system might retrieve your credit report and then query
you about specific entries in it.
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
YOU START REDUCING SECURITY
SETTINGS TO INCREASE INTEROPERABILITY
WITH OTHER OPERATING SYSTEMS OR
APPLICATIONS, YOU INTRODUCE
WEAKNESSES THAT MAY BE EXPLOITED
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
THREATCROWD.ORG
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
https://pipl.com/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://OPENPHISH.COM
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://OPENPHISH.COM
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://OSINTFRAMEWORK.COM/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
SHODAN.IO
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://WPVULNDB.COM/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://HAVEIBEENPWNED.COM/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://PASTEBIN.COM/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://WWW.EXPLOIT-DB.COM/GOOGLE-HACKING-DATABASE/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://WWW.EXPLOIT-DB.COM/GOOGLE-HACKING-DATABASE/
GOOGLE DORK
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
User Issues
• This issue is best addressed by training and education. An untrained user cannot possibly adhere to
good security practices because he or she is not aware of them. Security training is just as important as
any technology that you can purchase or policy that you can implement.
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
ZERO-DAY EXPLOITS
•
Secure Protocols
• HTTP – HTTPS
• SMTP – SMTPS
• POP3 – POP3S
• SMTP – SMTPS
• IMAP - IMAPS
• FTP – SFTP
• SSH
• DNS – DNSSEC
• LDAP – LDAPS
• RTP - sRTP
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
•
•
•
SECURITY BY DESIGN
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
•
•
•
•
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
• A SOCIAL ENGINEERING ATTACK MAY COME FROM SOMEONE POSING AS A VENDOR, OR IT COULD
TAKE THE FORM OF AN EMAIL FROM A (SUPPOSEDLY) TRAVELING EXECUTIVE WHO INDICATES THAT
THEY HAVE FORGOTTEN HOW TO LOG ON TO THE NETWORK OR HOW TO GET INTO THE BUILDING
OVER THE WEEKEND.
OCCASIONALLY, SOCIAL ENGINEERING IS ALSO REFERRED TO AS WETWARE. THIS TERM
IS USED BECAUSE IT IS A FORM OF HACKING THAT DOES NOT REQUIRE SOFTWARE OR
HARDWARE BUT RATHER THE GRAY MATTER OF THE BRAIN
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
SOCIAL ENGINEERING
•
•
•
•
•
•
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
GREED
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
•
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG

Weitere ähnliche Inhalte

Was ist angesagt?

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCAFrancis Amaning
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityCharles Mok
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
e-Trust and cyber security
e-Trust and cyber security e-Trust and cyber security
e-Trust and cyber security OneWebDay, Inc.
 
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in BrightonBuilding an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in BrightonBill Harpley
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of ThingsGiulio Coraggio
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)U.S. Chamber of Commerce
 
ITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessclaudiajelea
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber SecurityNICVA
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018The Drum
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismPaul van Heel
 

Was ist angesagt? (20)

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
e-Trust and cyber security
e-Trust and cyber security e-Trust and cyber security
e-Trust and cyber security
 
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in BrightonBuilding an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
 
ITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT business
 
CISA's Privacy Facts
CISA's Privacy FactsCISA's Privacy Facts
CISA's Privacy Facts
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 

Ähnlich wie Social Engineering and other Foes in the GDPR Year

Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Cori Faklaris
 
Digital economy and law keynote by Jude Umeh
Digital economy and law keynote by Jude UmehDigital economy and law keynote by Jude Umeh
Digital economy and law keynote by Jude UmehJude Umeh
 
What is next for Technology and Innovation?
What is next for Technology and Innovation?What is next for Technology and Innovation?
What is next for Technology and Innovation?paul young cpa, cga
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Driven Innovation
 
Data protection in smart cities application of the EU GDPR
Data protection in smart cities application of the EU GDPRData protection in smart cities application of the EU GDPR
Data protection in smart cities application of the EU GDPRMaria Stefanouli
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
 
IR 4.0 Transitional Stage - Where Are We Mow
IR 4.0 Transitional Stage - Where Are We MowIR 4.0 Transitional Stage - Where Are We Mow
IR 4.0 Transitional Stage - Where Are We MowDr. Mazlan Abbas
 
Blockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovationBlockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovationsamossummit
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018VARINDIA
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCapgemini
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuNixu Corporation
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018 James Quinlan
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsKristian Alisasis Pura
 
Infusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA AthensInfusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA AthensFITMAN FI
 
Introduction to Machine Learning: How to Create Text Classification
Introduction to Machine Learning: How to Create Text ClassificationIntroduction to Machine Learning: How to Create Text Classification
Introduction to Machine Learning: How to Create Text ClassificationMoch Ari Nasichuddin
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Knowjxyz
 

Ähnlich wie Social Engineering and other Foes in the GDPR Year (20)

Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
Digital economy and law keynote by Jude Umeh
Digital economy and law keynote by Jude UmehDigital economy and law keynote by Jude Umeh
Digital economy and law keynote by Jude Umeh
 
What is next for Technology and Innovation?
What is next for Technology and Innovation?What is next for Technology and Innovation?
What is next for Technology and Innovation?
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
 
Data protection in smart cities application of the EU GDPR
Data protection in smart cities application of the EU GDPRData protection in smart cities application of the EU GDPR
Data protection in smart cities application of the EU GDPR
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
IR 4.0 Transitional Stage - Where Are We Mow
IR 4.0 Transitional Stage - Where Are We MowIR 4.0 Transitional Stage - Where Are We Mow
IR 4.0 Transitional Stage - Where Are We Mow
 
Blockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovationBlockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovation
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Infusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA AthensInfusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA Athens
 
Introduction to Machine Learning: How to Create Text Classification
Introduction to Machine Learning: How to Create Text ClassificationIntroduction to Machine Learning: How to Create Text Classification
Introduction to Machine Learning: How to Create Text Classification
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
 

Mehr von Massimo Chirivì

Il sequestro dei dati - Cybercrime e ransomware nel 2019
Il sequestro dei dati - Cybercrime e ransomware nel 2019Il sequestro dei dati - Cybercrime e ransomware nel 2019
Il sequestro dei dati - Cybercrime e ransomware nel 2019Massimo Chirivì
 
DHCP Server Attack - Metodologie di attacco e soluzioni
DHCP Server Attack - Metodologie di attacco e soluzioniDHCP Server Attack - Metodologie di attacco e soluzioni
DHCP Server Attack - Metodologie di attacco e soluzioniMassimo Chirivì
 
Ransomware Attack nel 2019 Dal file system ai database e non solo...
Ransomware Attack nel 2019 Dal file system ai database e non solo...Ransomware Attack nel 2019 Dal file system ai database e non solo...
Ransomware Attack nel 2019 Dal file system ai database e non solo...Massimo Chirivì
 
Carte di credito contactless: quali i rischi per la privacy e per il portaf...
Carte di credito contactless:  quali i rischi per la privacy e  per il portaf...Carte di credito contactless:  quali i rischi per la privacy e  per il portaf...
Carte di credito contactless: quali i rischi per la privacy e per il portaf...Massimo Chirivì
 
Sicurezza Informatica 24 Settembre 2010
Sicurezza Informatica 24 Settembre 2010Sicurezza Informatica 24 Settembre 2010
Sicurezza Informatica 24 Settembre 2010Massimo Chirivì
 
Cyber Security. Occorre maggiore attenzione.
Cyber Security. Occorre maggiore attenzione.Cyber Security. Occorre maggiore attenzione.
Cyber Security. Occorre maggiore attenzione.Massimo Chirivì
 
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?Massimo Chirivì
 
SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014Massimo Chirivì
 
ICT SECURITY E PMI - SMAU Milano 2013
ICT SECURITY E PMI -  SMAU Milano 2013ICT SECURITY E PMI -  SMAU Milano 2013
ICT SECURITY E PMI - SMAU Milano 2013Massimo Chirivì
 
La sicurezza delle Web Application - SMAU Business Bari 2013
La sicurezza delle Web Application - SMAU Business Bari 2013La sicurezza delle Web Application - SMAU Business Bari 2013
La sicurezza delle Web Application - SMAU Business Bari 2013Massimo Chirivì
 
Il Cloud computing nel 2012 - il know aziendale è al sicuro
Il Cloud computing nel 2012 - il know aziendale è al sicuroIl Cloud computing nel 2012 - il know aziendale è al sicuro
Il Cloud computing nel 2012 - il know aziendale è al sicuroMassimo Chirivì
 
Adolescenti salentini e social network
Adolescenti salentini e social networkAdolescenti salentini e social network
Adolescenti salentini e social networkMassimo Chirivì
 

Mehr von Massimo Chirivì (14)

Il sequestro dei dati - Cybercrime e ransomware nel 2019
Il sequestro dei dati - Cybercrime e ransomware nel 2019Il sequestro dei dati - Cybercrime e ransomware nel 2019
Il sequestro dei dati - Cybercrime e ransomware nel 2019
 
DHCP Server Attack - Metodologie di attacco e soluzioni
DHCP Server Attack - Metodologie di attacco e soluzioniDHCP Server Attack - Metodologie di attacco e soluzioni
DHCP Server Attack - Metodologie di attacco e soluzioni
 
Ransomware Attack nel 2019 Dal file system ai database e non solo...
Ransomware Attack nel 2019 Dal file system ai database e non solo...Ransomware Attack nel 2019 Dal file system ai database e non solo...
Ransomware Attack nel 2019 Dal file system ai database e non solo...
 
Carte di credito contactless: quali i rischi per la privacy e per il portaf...
Carte di credito contactless:  quali i rischi per la privacy e  per il portaf...Carte di credito contactless:  quali i rischi per la privacy e  per il portaf...
Carte di credito contactless: quali i rischi per la privacy e per il portaf...
 
Sicurezza Informatica 24 Settembre 2010
Sicurezza Informatica 24 Settembre 2010Sicurezza Informatica 24 Settembre 2010
Sicurezza Informatica 24 Settembre 2010
 
Cyber Security. Occorre maggiore attenzione.
Cyber Security. Occorre maggiore attenzione.Cyber Security. Occorre maggiore attenzione.
Cyber Security. Occorre maggiore attenzione.
 
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
 
SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014
 
ICT SECURITY E PMI - SMAU Milano 2013
ICT SECURITY E PMI -  SMAU Milano 2013ICT SECURITY E PMI -  SMAU Milano 2013
ICT SECURITY E PMI - SMAU Milano 2013
 
La sicurezza delle Web Application - SMAU Business Bari 2013
La sicurezza delle Web Application - SMAU Business Bari 2013La sicurezza delle Web Application - SMAU Business Bari 2013
La sicurezza delle Web Application - SMAU Business Bari 2013
 
Il Cloud computing nel 2012 - il know aziendale è al sicuro
Il Cloud computing nel 2012 - il know aziendale è al sicuroIl Cloud computing nel 2012 - il know aziendale è al sicuro
Il Cloud computing nel 2012 - il know aziendale è al sicuro
 
SMAU Milano 2011 - AIPSI
SMAU Milano 2011 - AIPSISMAU Milano 2011 - AIPSI
SMAU Milano 2011 - AIPSI
 
Adolescenti salentini e social network
Adolescenti salentini e social networkAdolescenti salentini e social network
Adolescenti salentini e social network
 
SMAU 2011 Bari
SMAU 2011 BariSMAU 2011 Bari
SMAU 2011 Bari
 

Kürzlich hochgeladen

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 

Kürzlich hochgeladen (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

Social Engineering and other Foes in the GDPR Year

  • 1. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 2. •AIPSI, ASSOCIAZIONE ITALIANA PROFESSIONISTI SICUREZZA INFORMATICA, CAPITOLO ITALIANO DI ISSA, INFORMATION SYSTEMS SECURITY ASSOCIATION, (WWW.ISSA.ORG) CHE CONTA >>10.000 SOCI, LA PIÙ GRANDE ASSOCIAZIONE NON-PROFIT DI PROFESSIONISTI DELLA SICUREZZA ICT NEL MONDO •AIPSI È IL PUNTO DI AGGREGAZIONE SUL TERRITORIO E DI TRASFERIMENTO DI KNOW-HOW PER I PROFESSIONISTI DELLA SICUREZZA DIGITALE, SIA DIPENDENTI SIA LIBERI PROFESSIONISTI ED IMPRENDITORI DEL SETTORE •SEDE CENTRALE: MILANO •SEDI TERRITORIALI : ANCONA-MACERATA, LECCE, TORINO, VERONA- VENEZIA •CONTATTI: AIPSI@AIPSI.ORG, SEGRETERIA@AIPSI.ORG Siamo presenti per tutti i 3 giorni di SMAU nella Area Community ICT VIENI A TROVARCI ! 2
  • 3. • AIUTARE I PROPRI SOCI NELLA CRESCITA PROFESSIONALE E QUINDI NELLA CRESCITA DEL LORO BUSINESS • OFFRIRE AI PROPRI SOCI SERVIZI QUALIFICATI PER TALE CRESCITA, CHE INCLUDONO • CONVEGNI, WORKSHOP, WEBINAR SIA A LIVELLO NAZIONALE CHE INTERNAZIONALE VIA ISSA • RAPPORTI ANNUALI E SPECIFICI OAD, OSSERVATORIO ATTACCHI DIGITALI IN ITALIA NEL NUOVO SITO HTTPS://WWW.OADWEB.IT • SUPPORTO NELL’INTERO CICLO DI VITA PROFESSIONALE • FORMAZIONE SPECIALIZZATA E SUPPORTO ALLE CERTIFICAZIONI, IN PARTICOLARE ECF PLUS (EN 16234-1:2016, IN ITALIA UNI 11506) • RAPPORTI CON ALTRI SOCI A LIVELLO NAZIONALE (AIPSI) ED INTERNAZIONALI (ISSA) • CONTRIBUIRE ALLA DIFFUSIONE DELLA CULTURA E ALLA SENSIBILIZZAZIONE PER LA SICUREZZA DIGITALE • COLLABORAZIONE CON VARIE ASSOCIAZIONI ED ENTI PER EVENTI ED INIZIATIVE CONGIUNTE Creazione del Gruppo di lavoro CSWI, Cyber Security Women’s Italy, aperto anche alle Signore non Socie AIPSI 3 A breve disponibile il nuovo Rapporto 2018 OAD
  • 4. UTM SECURITY APPLIANCES Unified Threat Management Next Generation Firewall (NGFW) SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 5. NGFW / UTM • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 6. authentication systems or methods are based on one or more of these five factors: • • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 7. Another method that is becoming popular is out-of-band authentication. This is a process whereby the system you are authenticating gets information from public records and asks you questions to help authenticate you. For example, the system might retrieve your credit report and then query you about specific entries in it. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 8. YOU START REDUCING SECURITY SETTINGS TO INCREASE INTEROPERABILITY WITH OTHER OPERATING SYSTEMS OR APPLICATIONS, YOU INTRODUCE WEAKNESSES THAT MAY BE EXPLOITED SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 9. THREATCROWD.ORG SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 10. https://pipl.com/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 11. HTTPS://OPENPHISH.COM SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 12. HTTPS://OPENPHISH.COM SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 13. HTTPS://OSINTFRAMEWORK.COM/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 14. SHODAN.IO SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 15. HTTPS://WPVULNDB.COM/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 16. HTTPS://HAVEIBEENPWNED.COM/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 17. HTTPS://PASTEBIN.COM/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 18. HTTPS://WWW.EXPLOIT-DB.COM/GOOGLE-HACKING-DATABASE/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 19. HTTPS://WWW.EXPLOIT-DB.COM/GOOGLE-HACKING-DATABASE/ GOOGLE DORK SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 20. • • User Issues • This issue is best addressed by training and education. An untrained user cannot possibly adhere to good security practices because he or she is not aware of them. Security training is just as important as any technology that you can purchase or policy that you can implement. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 21. ZERO-DAY EXPLOITS • Secure Protocols • HTTP – HTTPS • SMTP – SMTPS • POP3 – POP3S • SMTP – SMTPS • IMAP - IMAPS • FTP – SFTP • SSH • DNS – DNSSEC • LDAP – LDAPS • RTP - sRTP SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 22. • • • • • SECURITY BY DESIGN SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 23. • • • • • • • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 24. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 25. • • A SOCIAL ENGINEERING ATTACK MAY COME FROM SOMEONE POSING AS A VENDOR, OR IT COULD TAKE THE FORM OF AN EMAIL FROM A (SUPPOSEDLY) TRAVELING EXECUTIVE WHO INDICATES THAT THEY HAVE FORGOTTEN HOW TO LOG ON TO THE NETWORK OR HOW TO GET INTO THE BUILDING OVER THE WEEKEND. OCCASIONALLY, SOCIAL ENGINEERING IS ALSO REFERRED TO AS WETWARE. THIS TERM IS USED BECAUSE IT IS A FORM OF HACKING THAT DOES NOT REQUIRE SOFTWARE OR HARDWARE BUT RATHER THE GRAY MATTER OF THE BRAIN SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 26. • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 27. SOCIAL ENGINEERING • • • • • • • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 28. GREED SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 29. • • • • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 30. • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 31. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG