SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Cyber Security
Secure business through innovation
Mission
To Transform and Secure business through innovation.
To be the most reliable business partner and employer of choice.
We empower our clients to explore new opportunities and
improve efficiency while minimizing security risks. Our solutions
are tailored by innovation to match clients’ unique challenges.
Vision
Proposition
Cyberteq is an innovative Information and
Communication Technology Consulting Company,
owned by Cybercom Singapore Pte Ltd.
Copyright © Cyberteq All rights reserved
Facts & Numbers Telecom
CHALLENGES
Compromised
Billing Platform /
CGW / HLR
Breach Discovery Maintenance /
Hardening
Loss of Customer
Data
Systems that are
not maintained
will become
vulnerable
Damage to
company
reputation and
legal impact
CONSEQUENCES
Breach will result in
financial loss and
fraudulent
activity
Undetected breach
will allow attackers
to do what they
want
Insider Threats
Loss of
intellectual
property
Threats and Challenges
Top Cyber attacks
Web Application Attacks
Malware
Mobile Application Attacks
DoS/DDoS
Reconnaissance Other Attack Types
19%
19%
20%
9%
9%
24%
• Information from company’s database
• Leak of customer information
• Payment transaction fraud
• Capture data packets from application
• Tailored attacks based on vulnerabilities
• Sniffing of user and server credentials
• Slow network performance
• Unavailable web and mobile applications
• Inability for customers to access banking
service
• Information gathering is first step in cyber attack
• Determine system vulnerabilities
• Preparation for attacks in the future
• Steal data: System and personal
information, banking credentials,
financial details, credit card numbers
and passwords
• Ransomware: encrypt your data and
demand ransom to restore it
• Social engineering attacks on employees
through phishing e-mail
• Insider threats
• Attacks from supplier organization
Cyberteq competence
• Mobile application pentest (android + ios)
• Source code review
• Reverse software engineering
Cases
• Försäkringskassan (Swedish social
insurance agency)
• Incident response
• Malware investigation
Cases
• Confidential
• Social engineering attacks:
Cases : Telecom and insurance companies
• Access control review
• Policies and procedure review
• Part of any vulnerability assessment
• Security Advisory
• Network Architecture review
Cases
• PostNord
• Penetration testing
• Source code review
Cases
• SEB (bank)
• Skandia (bank & insurance)
Web Application Attacks
Malware
Mobile Application Attacks
DoS/DDoS
Reconnaissance Other Attack Types
19%
19%
20%
9%
9%
24%
Factual Cyberteq Business Case
Executive
management team
Procurement
department
Finance department
Tech and IT
Customer service
Perform any activity including
shutdown of services
Increase prepaid balance and
delete billing data
• Administrative access to GGSN,
HLR, MSC and EIR
• Access to Billing system internally
and externally through internet
• Access to domain controller
• Compromise more than 200 servers
and 100 workstations
Access to sensitive
information for CxO level
• Access to domain controller
• Compromise more than 200 servers
and 100 workstation
Access to sensitive financial
information
Access to sensitive pricing and
bids information
• Access to domain controller
• Compromise more than 200 servers
and 100 workstations
• Administrative access to HLR and
data warehouse.
• Access to billing and prepaid system
Leak of subscriber personal
and private information
Factual Business Case
Cyberteq cyber security framework
• Is my organization secured
• Is my organization compromised
• What are my organization vulnerabilities
• What is my risk level
• How to mitigate my risk
• What type of standard is required
• How to protect my information and assets
• How to manage end point security
• How to assure constant compliance
• How to maintain my organization
security level
• How to keep my risk controlled
Assessment
Vulnerabilities
/Risk identified
Vulnerabilities
clearance
Security standard
implemented Continuous compliance
Evaluation Implementation Compliance
Risk control
level
Time
Client
challenges
Cyber Security
Framework
Cyberteq security model
Assessment
ABC Advantages:
• From reports to actions
• From post to dynamic implementation
• From recommendation to accountability
• From periodic compliance to “real time” compliance
ABC of Cyber Security
Assessment Boost Compliance
Security kits
Assessment
kit
Boost
Kit
Compliance
kit
Help clients to assess current
information security measures ,
identify vulnerabilities and gaps,
analyze risks and derive mitigation
plan.
Support clients to apply corrective
actions, create and implement
adequate security standards , define
required solution and boost security
awareness overall organization.
Help clients to apply right measures,
monitor compliance level to wide
range of security standards and
maintain accountability throughout
their organizations.
Copyright © Cyberteq All rights reserved
Assessment
kit
Advisory
• Security strategy review
• Security awareness
Security Assurance
• Vulnerability assessment - IT network, servers
• Penetration testing - Web and mobile
application
• Code review
• System and configuration review
• Network architecture review
• Access control review
• Social engineering
Risk Assessment
• Threat analysis
• Business impact
Copyright © Cyberteq All rights reserved
Boost
kit
Advisory Risk Mitigation Governance
• Asset and Data classification
• End point Security
• IAM and PAM advisory
• Mitigation action plan
• Implementation management
• Patch management
• Vulnerability post assessment
• Standard/policy awareness
• ISO 2700x , PCI/DSS GAP
Assessment
• Policy review , creation and
implementation
Copyright © Cyberteq All rights reserved
Compliance
kit
Advisory
• Compliance awareness • Standards/policies integration
• Compliance process
• Admin/user training
Compliance Portal Compliance Monitoring
• Compliance status per dep/sys/user
• Periodic compliance audit and
vulnerability assessment
Copyright © Cyberteq All rights reserved
mUnit is the next generation cyber security
appliance created by Cyberteq. It has re-shaped
the way of working with security and will replace
traditional security and risk assessments. It is also
your trusted partner in your road to achieving
compliance to any standard.
mUnit provides assessment to
identify and track vulnerabilities
with related business impact.
mUnit boosts your organization
security, by dynamic clearance of
security gaps and adequate policies
implementation.
mUnit manages compliance
to international security standards
Patent pending
Benefits for your business
Innovative
approach
Pay as you
need
Dynamic risk mitigation
and implementation
More
affordable
Pure action-oriented
Security
measurements
Cyber Security
Simpler than ever
Focus on
your business
Control risk and
Increased
accountability
Improve business
continuity
Manage brand
reputation
Copyright © Cyberteq All rights reserved
Patent pending
How it works
SSH
Assurance Team
SSH
Jump
Server
SSH
Internal Threats
External Threats
Security Assurance Monitoring
Copyright © Cyberteq All rights reserved
Patent pending
All in One
Advisory Assessment Governance
Mitigation Compliance Assurance
• Security snapshots
• Vulnerability assessment
• Vulnerability and action tracking
• Patch management
• With layered security
architecture
• Covering all security needs
• Security as a Service
• And many others
Main Functionalities
Copyright © Cyberteq All rights reserved
Patent pending
Clients
Telecom
Banking & Insurance
Cyberteq - Cyber Security for Telecom.pdf

Weitere ähnliche Inhalte

Ähnlich wie Cyberteq - Cyber Security for Telecom.pdf

CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapTripwire
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_BrochureCarolyn Tarrant
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityAnthony Dials
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfNaveenKumar470500
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Schneider Electric
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 

Ähnlich wie Cyberteq - Cyber Security for Telecom.pdf (20)

CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat Gap
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_Brochure
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent Cybersecurity
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
E banking & security
E banking & securityE banking & security
E banking & security
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 

Kürzlich hochgeladen

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Kürzlich hochgeladen (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Cyberteq - Cyber Security for Telecom.pdf

  • 1. Cyber Security Secure business through innovation
  • 2. Mission To Transform and Secure business through innovation. To be the most reliable business partner and employer of choice. We empower our clients to explore new opportunities and improve efficiency while minimizing security risks. Our solutions are tailored by innovation to match clients’ unique challenges. Vision Proposition Cyberteq is an innovative Information and Communication Technology Consulting Company, owned by Cybercom Singapore Pte Ltd. Copyright © Cyberteq All rights reserved
  • 3. Facts & Numbers Telecom
  • 4. CHALLENGES Compromised Billing Platform / CGW / HLR Breach Discovery Maintenance / Hardening Loss of Customer Data Systems that are not maintained will become vulnerable Damage to company reputation and legal impact CONSEQUENCES Breach will result in financial loss and fraudulent activity Undetected breach will allow attackers to do what they want Insider Threats Loss of intellectual property Threats and Challenges
  • 5. Top Cyber attacks Web Application Attacks Malware Mobile Application Attacks DoS/DDoS Reconnaissance Other Attack Types 19% 19% 20% 9% 9% 24% • Information from company’s database • Leak of customer information • Payment transaction fraud • Capture data packets from application • Tailored attacks based on vulnerabilities • Sniffing of user and server credentials • Slow network performance • Unavailable web and mobile applications • Inability for customers to access banking service • Information gathering is first step in cyber attack • Determine system vulnerabilities • Preparation for attacks in the future • Steal data: System and personal information, banking credentials, financial details, credit card numbers and passwords • Ransomware: encrypt your data and demand ransom to restore it • Social engineering attacks on employees through phishing e-mail • Insider threats • Attacks from supplier organization
  • 6. Cyberteq competence • Mobile application pentest (android + ios) • Source code review • Reverse software engineering Cases • Försäkringskassan (Swedish social insurance agency) • Incident response • Malware investigation Cases • Confidential • Social engineering attacks: Cases : Telecom and insurance companies • Access control review • Policies and procedure review • Part of any vulnerability assessment • Security Advisory • Network Architecture review Cases • PostNord • Penetration testing • Source code review Cases • SEB (bank) • Skandia (bank & insurance) Web Application Attacks Malware Mobile Application Attacks DoS/DDoS Reconnaissance Other Attack Types 19% 19% 20% 9% 9% 24%
  • 7. Factual Cyberteq Business Case Executive management team Procurement department Finance department Tech and IT Customer service Perform any activity including shutdown of services Increase prepaid balance and delete billing data • Administrative access to GGSN, HLR, MSC and EIR • Access to Billing system internally and externally through internet • Access to domain controller • Compromise more than 200 servers and 100 workstations Access to sensitive information for CxO level • Access to domain controller • Compromise more than 200 servers and 100 workstation Access to sensitive financial information Access to sensitive pricing and bids information • Access to domain controller • Compromise more than 200 servers and 100 workstations • Administrative access to HLR and data warehouse. • Access to billing and prepaid system Leak of subscriber personal and private information
  • 9. Cyberteq cyber security framework • Is my organization secured • Is my organization compromised • What are my organization vulnerabilities • What is my risk level • How to mitigate my risk • What type of standard is required • How to protect my information and assets • How to manage end point security • How to assure constant compliance • How to maintain my organization security level • How to keep my risk controlled Assessment Vulnerabilities /Risk identified Vulnerabilities clearance Security standard implemented Continuous compliance Evaluation Implementation Compliance Risk control level Time Client challenges Cyber Security Framework
  • 10. Cyberteq security model Assessment ABC Advantages: • From reports to actions • From post to dynamic implementation • From recommendation to accountability • From periodic compliance to “real time” compliance ABC of Cyber Security Assessment Boost Compliance
  • 11. Security kits Assessment kit Boost Kit Compliance kit Help clients to assess current information security measures , identify vulnerabilities and gaps, analyze risks and derive mitigation plan. Support clients to apply corrective actions, create and implement adequate security standards , define required solution and boost security awareness overall organization. Help clients to apply right measures, monitor compliance level to wide range of security standards and maintain accountability throughout their organizations. Copyright © Cyberteq All rights reserved
  • 12. Assessment kit Advisory • Security strategy review • Security awareness Security Assurance • Vulnerability assessment - IT network, servers • Penetration testing - Web and mobile application • Code review • System and configuration review • Network architecture review • Access control review • Social engineering Risk Assessment • Threat analysis • Business impact Copyright © Cyberteq All rights reserved
  • 13. Boost kit Advisory Risk Mitigation Governance • Asset and Data classification • End point Security • IAM and PAM advisory • Mitigation action plan • Implementation management • Patch management • Vulnerability post assessment • Standard/policy awareness • ISO 2700x , PCI/DSS GAP Assessment • Policy review , creation and implementation Copyright © Cyberteq All rights reserved
  • 14. Compliance kit Advisory • Compliance awareness • Standards/policies integration • Compliance process • Admin/user training Compliance Portal Compliance Monitoring • Compliance status per dep/sys/user • Periodic compliance audit and vulnerability assessment Copyright © Cyberteq All rights reserved
  • 15. mUnit is the next generation cyber security appliance created by Cyberteq. It has re-shaped the way of working with security and will replace traditional security and risk assessments. It is also your trusted partner in your road to achieving compliance to any standard. mUnit provides assessment to identify and track vulnerabilities with related business impact. mUnit boosts your organization security, by dynamic clearance of security gaps and adequate policies implementation. mUnit manages compliance to international security standards Patent pending
  • 16. Benefits for your business Innovative approach Pay as you need Dynamic risk mitigation and implementation More affordable Pure action-oriented Security measurements Cyber Security Simpler than ever Focus on your business Control risk and Increased accountability Improve business continuity Manage brand reputation Copyright © Cyberteq All rights reserved Patent pending
  • 17. How it works SSH Assurance Team SSH Jump Server SSH Internal Threats External Threats Security Assurance Monitoring Copyright © Cyberteq All rights reserved Patent pending
  • 18. All in One Advisory Assessment Governance Mitigation Compliance Assurance • Security snapshots • Vulnerability assessment • Vulnerability and action tracking • Patch management • With layered security architecture • Covering all security needs • Security as a Service • And many others Main Functionalities Copyright © Cyberteq All rights reserved Patent pending