SlideShare ist ein Scribd-Unternehmen logo
1 von 15
New challenges in Data privacy.
Zdravko Stoychev, CISM CRISC
Information Security Officer
Alpha Bank Bulgaria branch
South East European Regional Forum on Cybersecurity
and Cybercrime, 2013
11-13 Nov 2013
Sofia
1
CYBERCRIME FORUM

Alpha Bank
 Founded in 1879.
 The Bank grew considerably in the last decades,
developed into a major Group offering a wide range of
financial services.
 In 1999 the bank acquired 51% of the shares of the
Ionian Bank. The name of the enlarged, new Bank,
resulting from this merger is ALPHA BANK.
 On February 1, 2013 the entire share capital of
Emporiki Bank S.A. has been transferred to ALPHA
BANK.
 ALPHA BANK is one of the largest banks in Greece.
The Bank's activities cover the entire range of
financial services.
South East European Regional Forum on Cybersecurity and Cybercrime, 2013

2
CYBERCRIME FORUM

Agenda
 Current landscape



Trends & Statistics
The Internet Security

 Posed challenge




Fighting Cybercrime
Home vs. Enterprise
Global vs. Country

 Lessons Learned



Factors That Contribute
What Can We Do

 Summary

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

3
CYBERCRIME FORUM

Threat Landscape
Internet – a global shared domain
“The scale of DDoS attacks continue to expand”
“Web sites of security companies hacked by Anonymous”

“The damage done by cybercrime increased by 50%”
“Barely 4% of (UK) companies trust their IT security”
“The yearly average cybercrime cost per company in USA
increased by 78% in the past 4 years”

“The goals under attacks of this week [Dec 2012]:
U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC
Financial Services Group, SunTrust Banks, Inc.”
South East European Regional Forum on Cybersecurity and Cybercrime, 2013

4
CYBERCRIME FORUM

Down to Rabbit-Hole
The DDoS attacks achieved traffic per second
60%
50%
40%
30%

2013
2012

20%

10%
0%
~1Gb

2-10Gb
Source: Arbor Networks

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

5
CYBERCRIME FORUM

Down to Rabbit-Hole
 Attacks with duration under a hour:
87%
 Average time to mitigate the attack is on:
130% increase
 Less victims reported but the cost is on:
50% increase
where
 BYOD users constantly online:
49%

 Smartphones and tables w/o unlock PIN:
48%
Source: Arbor Networks , Ponemon Institute, Symantec

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

6
CYBERCRIME FORUM

Internet Security Threats
Cyber threats and Internet attacks are difficult to characterize and
respond to for a number of reasons:
 There are many different malicious actors.
 These actors have many different motives.
 The attacks look similar, so the nature of the attack does not always
help to identify the actor and the motive.
 Incident Handling Team will be required in place to manage the
attacks on per case basis.
 The speed of attack may overwhelm response methods that require
human interaction.
 The potential consequences of an attack can be hard to predict.
 The worst-case scenarios are alarming.
Source: Collective Defense Applying Public Health Models to the Internet

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

7
CYBERCRIME FORUM

The Posed Challenge
 Cyber crime is a fast-emerging threat and cyber attacks are being
recognised as a threat to national security.
 The most commonly reported crime is the theft of financial login
credentials, i.e. Web and mobile banking.
 The biggest and most common motivation is the financial gain.

 It drives a range of criminal activities, including phishing, pharming,
malware distribution and the hacking of corporate databases.
 Cyber crime is a truly global criminal phenomenon which does not
respond to single jurisdiction approaches to policing.
 Cyber crime is forcing us to rethink the basic skills needed for the job,
i.e. we need more Forensic Investigation specialists.
 Organisations need to assess the likelihood of being the target and
then defend against the techniques the most commonly use.
Source: Infosecurity Europe 2013, Global Economic Symposium

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

8
CYBERCRIME FORUM

Home and Enterprise Threats

Source: Microsoft

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

9
CYBERCRIME FORUM

Lowest Infection Rates Trends

Source: Microsoft

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

10
CYBERCRIME FORUM

Where Are We as a Country

Source: Microsoft

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

11
CYBERCRIME FORUM

Lessons from Least Infected Countries/regions
Factors that contribute to consistently low infection rates:
 Strong public–private partnerships exist that enable proactive and
response capabilities.
 Computer emergency response teams (CERTs), Internet service providers
(ISPs), and others who actively monitor for threats enable rapid response
to emerging threats.
 Enforcement policies and active remediation of threats via quarantining
infected systems on networks in the country/region is effective.
 An IT culture in which system administrators respond rapidly to reports of
system infections or abuse is helpful.

 Educational campaigns and media attention that help improve the public’s
awareness of security issues can pay dividends.
 Low software piracy rates and widespread usage of OS Update/Update
has helped keep infection rates relatively low.
Source: Microsoft
South East European Regional Forum on Cybersecurity and Cybercrime, 2013

12
CYBERCRIME FORUM

What Can We Do About It
 Deploy security in multiple layers
 Collaborate with CERTs, ISPs and others
 Seek public–private partnerships
 Ensure enforcement of security policies
 Run corporate educational programs
 Raise public’s awareness of security issues
 Well-known security tools may be outdated
 Utilize security analysis on network-level
e.g. BigData processing for trends detection, etc.
Source: Arbor Networks, Ponemon Institute

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

13
CYBERCRIME FORUM

Summary
 The threat landscape continues to become more complex and
mixes various threats to increase the likelihood of success.
 Awareness can secure humans by changing behaviors.
 Re-tool and incorporate next-generation technology.
 Collaboration, public-private relationships, early-warning
systems and real-time knowledge are needed.
 Security, thus data privacy, is everybody`s business.

South East European Regional Forum on Cybersecurity and Cybercrime, 2013

14
Questions?
Thank you!
Zdravko Stoychev, CISM CRISC
Company Information Security Officer

Alpha Bank Bulgaria branch
Email: zstoychev@alphabank.bg
Twitter: @zdravkos
15

Weitere ähnliche Inhalte

Was ist angesagt?

Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastMohamed N. El-Guindy
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
2011 Annual Study - U.S. Cost of a Data Breach - March 2012
2011 Annual Study - U.S. Cost of a Data Breach - March 20122011 Annual Study - U.S. Cost of a Data Breach - March 2012
2011 Annual Study - U.S. Cost of a Data Breach - March 2012Symantec
 
Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks seeweb
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 

Was ist angesagt? (20)

Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
2011 Annual Study - U.S. Cost of a Data Breach - March 2012
2011 Annual Study - U.S. Cost of a Data Breach - March 20122011 Annual Study - U.S. Cost of a Data Breach - March 2012
2011 Annual Study - U.S. Cost of a Data Breach - March 2012
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 

Andere mochten auch

Andere mochten auch (8)

(You better) change focus, 2015 finance ict & isaca v2
(You better) change focus, 2015 finance ict & isaca v2(You better) change focus, 2015 finance ict & isaca v2
(You better) change focus, 2015 finance ict & isaca v2
 
Training People and Rising Awareness
Training People and Rising AwarenessTraining People and Rising Awareness
Training People and Rising Awareness
 
Gettingstartedmaya2010 A1pdf
Gettingstartedmaya2010 A1pdfGettingstartedmaya2010 A1pdf
Gettingstartedmaya2010 A1pdf
 
ISACA Day - New CSX Certifications
ISACA Day - New CSX CertificationsISACA Day - New CSX Certifications
ISACA Day - New CSX Certifications
 
Rubiaceae
RubiaceaeRubiaceae
Rubiaceae
 
Latest Distress Bargains Costa Blanca Murcia
Latest Distress Bargains Costa Blanca MurciaLatest Distress Bargains Costa Blanca Murcia
Latest Distress Bargains Costa Blanca Murcia
 
ISACA Certification Program 2012
ISACA Certification Program 2012ISACA Certification Program 2012
ISACA Certification Program 2012
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 

Ähnlich wie New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sofia BG

Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfmessengerhelper4
 
Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfmessengerhelper4
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 

Ähnlich wie New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sofia BG (20)

Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdf
 
Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdf
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
University-of-Miami_MEDINA
University-of-Miami_MEDINAUniversity-of-Miami_MEDINA
University-of-Miami_MEDINA
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
C018131821
C018131821C018131821
C018131821
 
L123
L123L123
L123
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
comm16en01_dafc4
comm16en01_dafc4comm16en01_dafc4
comm16en01_dafc4
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 

Kürzlich hochgeladen

Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modellingbaijup5
 
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfGale Pooley
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Kürzlich hochgeladen (20)

Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modelling
 
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sofia BG

  • 1. New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013 Sofia 1
  • 2. CYBERCRIME FORUM Alpha Bank  Founded in 1879.  The Bank grew considerably in the last decades, developed into a major Group offering a wide range of financial services.  In 1999 the bank acquired 51% of the shares of the Ionian Bank. The name of the enlarged, new Bank, resulting from this merger is ALPHA BANK.  On February 1, 2013 the entire share capital of Emporiki Bank S.A. has been transferred to ALPHA BANK.  ALPHA BANK is one of the largest banks in Greece. The Bank's activities cover the entire range of financial services. South East European Regional Forum on Cybersecurity and Cybercrime, 2013 2
  • 3. CYBERCRIME FORUM Agenda  Current landscape   Trends & Statistics The Internet Security  Posed challenge    Fighting Cybercrime Home vs. Enterprise Global vs. Country  Lessons Learned   Factors That Contribute What Can We Do  Summary South East European Regional Forum on Cybersecurity and Cybercrime, 2013 3
  • 4. CYBERCRIME FORUM Threat Landscape Internet – a global shared domain “The scale of DDoS attacks continue to expand” “Web sites of security companies hacked by Anonymous” “The damage done by cybercrime increased by 50%” “Barely 4% of (UK) companies trust their IT security” “The yearly average cybercrime cost per company in USA increased by 78% in the past 4 years” “The goals under attacks of this week [Dec 2012]: U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Services Group, SunTrust Banks, Inc.” South East European Regional Forum on Cybersecurity and Cybercrime, 2013 4
  • 5. CYBERCRIME FORUM Down to Rabbit-Hole The DDoS attacks achieved traffic per second 60% 50% 40% 30% 2013 2012 20% 10% 0% ~1Gb 2-10Gb Source: Arbor Networks South East European Regional Forum on Cybersecurity and Cybercrime, 2013 5
  • 6. CYBERCRIME FORUM Down to Rabbit-Hole  Attacks with duration under a hour: 87%  Average time to mitigate the attack is on: 130% increase  Less victims reported but the cost is on: 50% increase where  BYOD users constantly online: 49%  Smartphones and tables w/o unlock PIN: 48% Source: Arbor Networks , Ponemon Institute, Symantec South East European Regional Forum on Cybersecurity and Cybercrime, 2013 6
  • 7. CYBERCRIME FORUM Internet Security Threats Cyber threats and Internet attacks are difficult to characterize and respond to for a number of reasons:  There are many different malicious actors.  These actors have many different motives.  The attacks look similar, so the nature of the attack does not always help to identify the actor and the motive.  Incident Handling Team will be required in place to manage the attacks on per case basis.  The speed of attack may overwhelm response methods that require human interaction.  The potential consequences of an attack can be hard to predict.  The worst-case scenarios are alarming. Source: Collective Defense Applying Public Health Models to the Internet South East European Regional Forum on Cybersecurity and Cybercrime, 2013 7
  • 8. CYBERCRIME FORUM The Posed Challenge  Cyber crime is a fast-emerging threat and cyber attacks are being recognised as a threat to national security.  The most commonly reported crime is the theft of financial login credentials, i.e. Web and mobile banking.  The biggest and most common motivation is the financial gain.  It drives a range of criminal activities, including phishing, pharming, malware distribution and the hacking of corporate databases.  Cyber crime is a truly global criminal phenomenon which does not respond to single jurisdiction approaches to policing.  Cyber crime is forcing us to rethink the basic skills needed for the job, i.e. we need more Forensic Investigation specialists.  Organisations need to assess the likelihood of being the target and then defend against the techniques the most commonly use. Source: Infosecurity Europe 2013, Global Economic Symposium South East European Regional Forum on Cybersecurity and Cybercrime, 2013 8
  • 9. CYBERCRIME FORUM Home and Enterprise Threats Source: Microsoft South East European Regional Forum on Cybersecurity and Cybercrime, 2013 9
  • 10. CYBERCRIME FORUM Lowest Infection Rates Trends Source: Microsoft South East European Regional Forum on Cybersecurity and Cybercrime, 2013 10
  • 11. CYBERCRIME FORUM Where Are We as a Country Source: Microsoft South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11
  • 12. CYBERCRIME FORUM Lessons from Least Infected Countries/regions Factors that contribute to consistently low infection rates:  Strong public–private partnerships exist that enable proactive and response capabilities.  Computer emergency response teams (CERTs), Internet service providers (ISPs), and others who actively monitor for threats enable rapid response to emerging threats.  Enforcement policies and active remediation of threats via quarantining infected systems on networks in the country/region is effective.  An IT culture in which system administrators respond rapidly to reports of system infections or abuse is helpful.  Educational campaigns and media attention that help improve the public’s awareness of security issues can pay dividends.  Low software piracy rates and widespread usage of OS Update/Update has helped keep infection rates relatively low. Source: Microsoft South East European Regional Forum on Cybersecurity and Cybercrime, 2013 12
  • 13. CYBERCRIME FORUM What Can We Do About It  Deploy security in multiple layers  Collaborate with CERTs, ISPs and others  Seek public–private partnerships  Ensure enforcement of security policies  Run corporate educational programs  Raise public’s awareness of security issues  Well-known security tools may be outdated  Utilize security analysis on network-level e.g. BigData processing for trends detection, etc. Source: Arbor Networks, Ponemon Institute South East European Regional Forum on Cybersecurity and Cybercrime, 2013 13
  • 14. CYBERCRIME FORUM Summary  The threat landscape continues to become more complex and mixes various threats to increase the likelihood of success.  Awareness can secure humans by changing behaviors.  Re-tool and incorporate next-generation technology.  Collaboration, public-private relationships, early-warning systems and real-time knowledge are needed.  Security, thus data privacy, is everybody`s business. South East European Regional Forum on Cybersecurity and Cybercrime, 2013 14
  • 15. Questions? Thank you! Zdravko Stoychev, CISM CRISC Company Information Security Officer Alpha Bank Bulgaria branch Email: zstoychev@alphabank.bg Twitter: @zdravkos 15

Hinweis der Redaktion

  1. The Third South East European Regional Forum on Cybersecurity and Cybercrime will take place in Sofia, Bulgaria, at Sofia Hilton Hotel from Monday 11 to Wednesday 13 of November 2013. The event will bring together representatives of leading ICT, energy, utility and pharmaceutical companies, financial institutions, banks, non-governmental organizations and high-level officials from law enforcement agencies.http://cybercrimeforum.bg/?lang=en
  2. The rate of growth of the information society, the sophistication of threats targeting users, and the potential consequences of consumer devices being directed towards critical infrastructures requires new thinking and new collective action by the Internet community. We cannot expect consumers to become security experts, but if we think about how the public health model helps consumers to understand when they are ill and when they should get treated, we can come up with relevant concepts that are applicable to Internet security. The public health model is not perfect, nor does it need to be—where there are differences there may also be useful insights. For example, the medical model is massively distributed and has far more endpoints (doctors, nurses and pharmacists) than the computer model (there are fewer access providers than medical professionals), so IT professionals may identify critical trends more quickly. And while computer viruses may spread faster than human viruses, automation may permit devices to be vaccinated more quickly than people. Governments and industry, by focusing on the similarities and differences between the physical and the IT world can construct IT response mechanisms far more effective than what exists today.
  3. CHALLENGES:- It can prove difficult to automate investigation processes.Because of this the increasing number of Internet users causes difficulties for the law-enforcement agencies. As opposed to, offenders can use automation to scale up their activities. This affects developing countries in particular.- Growing relianceon ICTs makes systems and services more vulnerable to attacks against critical infrastructures. Evenshort interruptions to services could cause huge financial damages to e-commerce businesses.- Criminals can commit serious computer crimes with only cheap or second-hand computer technology – knowledge counts for far more than equipment. This Internet data and fast search technology can be used for both legitimate and criminal purposes. Criminals can also use search engines to analyse targets.- The Internet’s network infrastructure is resistant to external attempts at control. It was not originally designed to facilitate criminal investigations or to prevent attacks from inside the network. The absence of control instruments makes cybercrime investigations very difficult.- Cybercrime investigations need the support and involvement of authorities in all countries involved. The harmonization of cybercrime-related laws and international cooperation would help. Over recent years, botnets have become a serious risk for cybersecurity. Increasing network capacities is also a major issue. The gap between the capacities of investigating authorities and those under control of criminals is getting wider. Another challenge is the use of wireless access points. The expansion of wireless Internet access in developing countries is an opportunity, as well as a challenge. Another factor that can complicate the investigation of cybercrime is encryption technology. Techniques can also be combined. Using software tools, offenders can encrypt messages and exchange them in pictures or images.WHAT WE CAN DO:- Strategies must be formulated to prevent attacks and develop countermeasures, including thedevelopment and promotion of technical means of protection. It is vital not only to educate the people involved in the fight against cybercrime, but also to draft adequate and effective legislation.
  4. For enterprises, it is clear that typical perimeter defenses such as firewalls and IPS are not effective when dealing with DDoS attacks, as each technology inline to the target is actually a potential bottleneck. These devices can be an important part of a layered defense strategy but they were built for problems far different than today’s complex DDoS threat. Given the complexity of today’s threat landscape, and the nature of application layer attacks, it is increasingly clear that enterprises need better visibility and control over their networks which require a purpose built, on-premise DDoS mitigation solution. This could sound self-serving, however, visibility into a DDoS attack needs to be far better than the first report of your Website or critical business asset going down. Without real-time knowledge of the attack, defense and recovery becomes increasingly difficult.
  5. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation…
  6. The motivation of modern attackers can be singular, but…