SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
(ISC)2 Workshop – Geneva, 18-02-2014
“From Social Media Chaos to Social Business Security”

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Who am I (in 60 seconds)

Andrea Zapparoli Manzoni


Founder, CEO, iDIALOGHI



«Cyberworld» WG Member at OSN/Ce.Mi.S.S.



APASS Board Member / Information Warfare lead res.



Assintel Board Member / ICT Security WG leader



Clusit Board Member / lecturer (SCADA, Social Media
Sec, Anti-fraud, DLP…)



Co-author of the Clusit Report (2012, 2013 and 2014)

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Who am I (in 30 more seconds)

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Who am I (last 30 seconds, I promise)

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ A (necessary) disclaimer

The views hereby expressed are those of the
Author / Speaker and do not reflect the views
of CLUSIT, nor those of the WG “Cyber World”
at OSN - Italian Ministry of Defense, nor those
of the private enterprises and security
communities I am working at/with and/or
supporting.

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→Why are we here?

 2012: + 150% serious known cyberattacks in the world vs 2011
 2012: +800% serious know cyberattacks against / through Social Media platforms
 Huge growth of evil doers and of offensive capabilities all over the world
 Everyone is now a target (Citizens, Corporations, Institutions, Gov/Mil)
 All platforms are now a target (PCs, Mobile, Social, Cloud, SCADA, IoT, PoS…)
 Traditional defenses are not working anymore
 Return of Investment (ROI) for attackers is extremely high
 Costs and Risks for attackers are still extremely low
 Growing risk of systemic “Black Swans” (HILP)
 Lack of effective legislation and tools for LEAs
How do we handle all these issues and mitigate these new threats?

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→Cyber Insecurity is the New Norm

It’s a Jungle Out There

International Serious Cyber Attacks
800
700

Private Organizations spent USD 20B for
“advanced” ICT Security systems in 2012,
out of a USD 60B budget for ICT Security
spending. Nothwistanding these efforts,
Cyber Insecurity is becoming the norm.

600
500
400
300
200
100
0
1 H 2011

2 H 2011

1 H 2012

2 H 2012

1 H 2013

© Clusit - Rapporto 2013 sulla Sicurezza ICT in Italia – June 2013 Update

From our analyses, which are in line with
those made by other observers (private and
institutional), the rate of attacks against
Companies and Government bodies in 2012
grew by 154% on average compared to
2011 (which was the worst year on record,
until then). The speed of this growth has
accelerated in 2013, too. Why?
Andrea Zapparoli Manzoni - CEO iDialoghi

© Clusit - Rapporto 2013 sulla Sicurezza ICT in Italia

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Reason # 1: ICT Products Security levels are not what you may think

!=

The Fiat was my first car, back in 1987 (it was built in 1968). I was very proud of it and,
after all, it worked. But it had NO built-in security whatsoever. No brakes, no seat belts,
no ABS, ESP, airbag, headrests, no passive security – nothing.
Today’s ICT is like my 1968 Fiat, in terms of built-in security.
As a consequence, in 2012 this inherent cyber insecurity had a global (direct and indirect)
estimated cost of USD 388 Billions (that is, Denmark’s GDP).
Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Reason # 2: Cybercrime is the “best” investment on the planet

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Reason # 2 So many ways to profit from a compromised device!

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Threats are growing expecially on Social Media

Threats to Online Services, including Social Media and Cloud Services: +800% Y/Y
VITTIME PER TIPOLOGIA

2011

2012

Variazioni 2012 su 2011

Gov - Mil - LEAs - Intelligence

153

374

244,44%

Others

97

194

200,00%

Entertainment / News

76

175

230,26%

Online Services / Cloud

15

136

806,67%

Research - Education

26

104

400,00%

Banking / Finance

17

59

347,06%

SW / HW Vendor

27

59

218,52%

Telco

11

19

172,73%

Gov. Contractors / Cons.

18

15

-16,67%

Security

17

14

-17,65%

Religion

0

14

1400,00%

Health

10

11

110,00%

Chemical / Medical

2

9

450,00%

Critical Infrastructures

-

-

-

Automotive

-

-

-

Org / ONG

-

-

-

© Clusit - Rapporto 2013 sulla Sicurezza ICT in Italia

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ OK. But what are Social Media?

Wikipedia: “A group of Internet-based applications that build on the ideological and
technological foundations of Web 2.0, and that allow the creation and exchange of
user-generated content”.
This is certainly true, but…
 Why are they (mostly) free?
 Who owns them (really)?
 Who controls them (really)?
 What do they do with everybody’s social graphs?
 And with all the information?
 And with all the pictures?
 What’s written inside their EULAs ?
 Are they filtered?
 Are they neutral?
 Are they secure?
Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are also… weapons

Over the last 3 years Social Media have become “weapons”
in all respects, and are now part of the "cyber arsenal " at
the disposal of armies, intelligence services, police forces,
terrorists, mercenary groups, antagonistic groups and
corporations.
Some facts:
 Actively used by Anonymous, S.E.A. (and similar groups)
 Actively used by Governments (Iran, Syria, China, USA etc)
to PsyOps, OSINT, mass surveillance and target acquisition
 Used by the "Arab Spring" rebels as C4ISR1 and by Special
Forces in Libya in support of NATO operations
 Used by Corporations against competitors and hacktivists
1 Command, Control, Computers, Communications, Intelligence, Surveillance and Reconnaissance

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are also… targets (and SPoF)

Having become a weapon and a battlefield, Social Media inevitably also became
a target.
This means that at any time could be attacked, blocked and made inaccessible,
or unusable (i.e. by using swarms of “bots”, or by simply shutting them down).
In fact it has already happened, because of:
- Riots, insurrections and civil wars
- Cyber ​attacks of various kinds and purpose
- Sabotage and protest
- State censorship
Social Media platforms cannot (and shouldn’t) be trusted.

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are also… Cyber Crime Paradise

Today Social Media have become the main hunting ground
for trans-national organized cybercrime, which has reached
a "turnover" in 2012 (estimated) of $ 15 Billion, an increase
of 250% over the previous year.
In 2012, 74 million people have been victims of some sort of
cybercrime in the U.S. alone (1/3 via Social Media, 10 per
second) for $ 32 B of direct losses. In the world the
estimated direct losses in 2012 were over $ 110 B.
The total cost worldwide (direct losses + costs & time
devoted to remedy attacks) in 2012 was estimated at $ 388
B. It is more than the GDP of Vietnam, Ukraine and Romania
added! If this trend continues, in 2013 these costs will be
equal to half of the Italian GDP .... (1 Trillion USD).

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are also… a risk for their Users

We could make
thousands of
examples, every day
there are new ones….

I.E. taking advantage of the news of Bin Laden’s death,
tens of thousands of Facebook users were lured into
dowloading a trojan (not detected by antivirus
software) that stealed personal data and transformed
the PC of the victims into “zombies”…
Due to the nature of social media, cyber criminals
have the ability to infect millions of systems (PCs or
mobile) in a matter of a few hours ... For free.
Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are also… a risk for Businesses

Social Media is an important source of business risk ... even for companies
that do not use them! Cyber ​attacks, fraud, data, IP and money theft, unfair
competition, damages to third parties and to the corporate image ...

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (latest Italian example)

120.000 Italian users exposed to Zeus malware for more than 48 hours on Alpitour’s hijacked FB page
Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (more examples)

Simple (but effective) social engineering attack for identity theft purposes

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (more examples)

More Social Engineering (in these cases,
in order to spread botnet malware / RATs).

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (more examples)

Phishing via rogue Facebook App

Andrea Zapparoli Manzoni - CEO iDialoghi

Spear Phishing via LinkedIn

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (more examples)

Mal-advertising: paid malicious ADVs (hint: there’s no WhatsApp for PCs…)

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (more examples)

Social Media stolen credentials on sale on a (small) russian cybercriminal forum

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (more examples)

Kaspersky 2013

Number of phishing attacks against Social Media users (august 2013)

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (more examples)

PsyOps via Twitter

(the “Syrian Electronic Army,” a pro-Assad mercenary group, hacked AP’s twitter account and then…)
Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Social Media are a major attack vector (more examples)

A single, well crafted fake tweet inflicted the NYSE a 53B USD loss in 5 minutes. What if …… ?
Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ The Path From Chaos to Security

Knowledge is power. In such a new and complex context it is necessary to set up
a continuous training process for Managers, End users, Decision Makers, LEAs,
Marketing staff, HR staff, ICT / Security staff, and so on.
Since incidents are only a matter of time, it is essential to
implement a set of processes for Risk Management / BIA,
harmonized and coordinated within an overall plan for
Social Media Security:
- Definition of specific Policies and Responsibilities
- Continuous Monitoring and Enforcement of the policies
- Cyber Threat Prevention / Cyber Intelligence
- Definition of Early Warning indicators
- Legal protection (proactive and reactive)
- Crisis Management (in real-time!)
Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014
From Social Media Chaos to Social Business Security
→ Thank you!

Andrea Zapparoli Manzoni
a.zmanzoni@idialoghi.com

Andrea Zapparoli Manzoni - CEO iDialoghi

Geneva 18-02 2014

Mais conteúdo relacionado

Mais procurados

Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismNicole Gaehle, MSIST
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexAndreanne Clarke
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 

Mais procurados (14)

Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 

Destaque

Social Media Security 2013 - Andrea Zapparoli Manzoni
Social Media Security 2013 - Andrea Zapparoli ManzoniSocial Media Security 2013 - Andrea Zapparoli Manzoni
Social Media Security 2013 - Andrea Zapparoli ManzoniiDIALOGHI
 
iDialoghi: L'alba dell'IPv6: opportunita' e problemi
iDialoghi: L'alba dell'IPv6: opportunita' e problemiiDialoghi: L'alba dell'IPv6: opportunita' e problemi
iDialoghi: L'alba dell'IPv6: opportunita' e problemiiDIALOGHI
 
iDialoghi - La Sicurezza dei SOCIAL MEDIA
iDialoghi - La Sicurezza dei SOCIAL MEDIAiDialoghi - La Sicurezza dei SOCIAL MEDIA
iDialoghi - La Sicurezza dei SOCIAL MEDIAiDIALOGHI
 
iDialoghi - La Sicurezza dei Social Media in ambito Business
iDialoghi - La Sicurezza dei Social Media in ambito BusinessiDialoghi - La Sicurezza dei Social Media in ambito Business
iDialoghi - La Sicurezza dei Social Media in ambito BusinessiDIALOGHI
 
Le 4 dimensioni di un progetto DLLP di successo
Le 4 dimensioni di un progetto DLLP di successoLe 4 dimensioni di un progetto DLLP di successo
Le 4 dimensioni di un progetto DLLP di successoiDIALOGHI
 
Clusit Edu Social Business Security
Clusit Edu Social Business SecurityClusit Edu Social Business Security
Clusit Edu Social Business SecurityiDIALOGHI
 
iDialoghi - Social Business Security - Social Media Week 2011
iDialoghi - Social Business Security - Social Media Week 2011iDialoghi - Social Business Security - Social Media Week 2011
iDialoghi - Social Business Security - Social Media Week 2011iDIALOGHI
 
ITSecPro roundtable: "Cyberwarfare 2013, all on the front line" - Andrea Zapp...
ITSecPro roundtable: "Cyberwarfare 2013, all on the front line" - Andrea Zapp...ITSecPro roundtable: "Cyberwarfare 2013, all on the front line" - Andrea Zapp...
ITSecPro roundtable: "Cyberwarfare 2013, all on the front line" - Andrea Zapp...iDIALOGHI
 
Triboo WEBinar - Digital Revolution
Triboo WEBinar - Digital RevolutionTriboo WEBinar - Digital Revolution
Triboo WEBinar - Digital Revolutiontriboomanagement
 
iDialoghi - Social Media Security Management
iDialoghi - Social Media Security Management iDialoghi - Social Media Security Management
iDialoghi - Social Media Security Management iDIALOGHI
 
APT, Social Network e Cybercriminali: Strategie difensive
APT, Social Network e Cybercriminali: Strategie difensiveAPT, Social Network e Cybercriminali: Strategie difensive
APT, Social Network e Cybercriminali: Strategie difensiveiDIALOGHI
 
Gli attacchi DDoS - Cyber Crime Conference Rome 2013 - Security Brokers
Gli attacchi DDoS - Cyber Crime Conference Rome 2013 - Security BrokersGli attacchi DDoS - Cyber Crime Conference Rome 2013 - Security Brokers
Gli attacchi DDoS - Cyber Crime Conference Rome 2013 - Security BrokersiDIALOGHI
 
iDialoghi - ICT Security Consulting
iDialoghi - ICT Security ConsultingiDialoghi - ICT Security Consulting
iDialoghi - ICT Security ConsultingiDIALOGHI
 
Cybersecurity e Vulnerabilita' dei sistemi SCADA
Cybersecurity e Vulnerabilita' dei sistemi SCADACybersecurity e Vulnerabilita' dei sistemi SCADA
Cybersecurity e Vulnerabilita' dei sistemi SCADAiDIALOGHI
 
Social Network in ambito medico sanitario: vantaggi, rischi e prospettive.
Social Network in ambito medico sanitario: vantaggi, rischi e prospettive.Social Network in ambito medico sanitario: vantaggi, rischi e prospettive.
Social Network in ambito medico sanitario: vantaggi, rischi e prospettive.iDIALOGHI
 
Clusit Education - Cyber Intelligence 2013 (Andrea Zapparoli Manzoni)
Clusit Education -  Cyber Intelligence 2013 (Andrea Zapparoli Manzoni)Clusit Education -  Cyber Intelligence 2013 (Andrea Zapparoli Manzoni)
Clusit Education - Cyber Intelligence 2013 (Andrea Zapparoli Manzoni)iDIALOGHI
 
Security Awareness in ambito scolastico
Security Awareness in ambito scolasticoSecurity Awareness in ambito scolastico
Security Awareness in ambito scolasticoGiampaolo Franco
 
Italian cyber security report 2014
Italian cyber security report 2014Italian cyber security report 2014
Italian cyber security report 2014Roberto Baldoni
 

Destaque (19)

Social Media Security 2013 - Andrea Zapparoli Manzoni
Social Media Security 2013 - Andrea Zapparoli ManzoniSocial Media Security 2013 - Andrea Zapparoli Manzoni
Social Media Security 2013 - Andrea Zapparoli Manzoni
 
iDialoghi: L'alba dell'IPv6: opportunita' e problemi
iDialoghi: L'alba dell'IPv6: opportunita' e problemiiDialoghi: L'alba dell'IPv6: opportunita' e problemi
iDialoghi: L'alba dell'IPv6: opportunita' e problemi
 
iDialoghi - La Sicurezza dei SOCIAL MEDIA
iDialoghi - La Sicurezza dei SOCIAL MEDIAiDialoghi - La Sicurezza dei SOCIAL MEDIA
iDialoghi - La Sicurezza dei SOCIAL MEDIA
 
iDialoghi - La Sicurezza dei Social Media in ambito Business
iDialoghi - La Sicurezza dei Social Media in ambito BusinessiDialoghi - La Sicurezza dei Social Media in ambito Business
iDialoghi - La Sicurezza dei Social Media in ambito Business
 
Le 4 dimensioni di un progetto DLLP di successo
Le 4 dimensioni di un progetto DLLP di successoLe 4 dimensioni di un progetto DLLP di successo
Le 4 dimensioni di un progetto DLLP di successo
 
Clusit Edu Social Business Security
Clusit Edu Social Business SecurityClusit Edu Social Business Security
Clusit Edu Social Business Security
 
iDialoghi - Social Business Security - Social Media Week 2011
iDialoghi - Social Business Security - Social Media Week 2011iDialoghi - Social Business Security - Social Media Week 2011
iDialoghi - Social Business Security - Social Media Week 2011
 
ITSecPro roundtable: "Cyberwarfare 2013, all on the front line" - Andrea Zapp...
ITSecPro roundtable: "Cyberwarfare 2013, all on the front line" - Andrea Zapp...ITSecPro roundtable: "Cyberwarfare 2013, all on the front line" - Andrea Zapp...
ITSecPro roundtable: "Cyberwarfare 2013, all on the front line" - Andrea Zapp...
 
Triboo WEBinar - Digital Revolution
Triboo WEBinar - Digital RevolutionTriboo WEBinar - Digital Revolution
Triboo WEBinar - Digital Revolution
 
ECSM 2015 - Video Awareness Security
ECSM 2015 - Video Awareness SecurityECSM 2015 - Video Awareness Security
ECSM 2015 - Video Awareness Security
 
iDialoghi - Social Media Security Management
iDialoghi - Social Media Security Management iDialoghi - Social Media Security Management
iDialoghi - Social Media Security Management
 
APT, Social Network e Cybercriminali: Strategie difensive
APT, Social Network e Cybercriminali: Strategie difensiveAPT, Social Network e Cybercriminali: Strategie difensive
APT, Social Network e Cybercriminali: Strategie difensive
 
Gli attacchi DDoS - Cyber Crime Conference Rome 2013 - Security Brokers
Gli attacchi DDoS - Cyber Crime Conference Rome 2013 - Security BrokersGli attacchi DDoS - Cyber Crime Conference Rome 2013 - Security Brokers
Gli attacchi DDoS - Cyber Crime Conference Rome 2013 - Security Brokers
 
iDialoghi - ICT Security Consulting
iDialoghi - ICT Security ConsultingiDialoghi - ICT Security Consulting
iDialoghi - ICT Security Consulting
 
Cybersecurity e Vulnerabilita' dei sistemi SCADA
Cybersecurity e Vulnerabilita' dei sistemi SCADACybersecurity e Vulnerabilita' dei sistemi SCADA
Cybersecurity e Vulnerabilita' dei sistemi SCADA
 
Social Network in ambito medico sanitario: vantaggi, rischi e prospettive.
Social Network in ambito medico sanitario: vantaggi, rischi e prospettive.Social Network in ambito medico sanitario: vantaggi, rischi e prospettive.
Social Network in ambito medico sanitario: vantaggi, rischi e prospettive.
 
Clusit Education - Cyber Intelligence 2013 (Andrea Zapparoli Manzoni)
Clusit Education -  Cyber Intelligence 2013 (Andrea Zapparoli Manzoni)Clusit Education -  Cyber Intelligence 2013 (Andrea Zapparoli Manzoni)
Clusit Education - Cyber Intelligence 2013 (Andrea Zapparoli Manzoni)
 
Security Awareness in ambito scolastico
Security Awareness in ambito scolasticoSecurity Awareness in ambito scolastico
Security Awareness in ambito scolastico
 
Italian cyber security report 2014
Italian cyber security report 2014Italian cyber security report 2014
Italian cyber security report 2014
 

Semelhante a From Social Media Chaos to Social Business Security - Geneva 2014

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
DWS16 - Plenary - from the digital economy to the digital trust economy - Yve...
DWS16 - Plenary - from the digital economy to the digital trust economy - Yve...DWS16 - Plenary - from the digital economy to the digital trust economy - Yve...
DWS16 - Plenary - from the digital economy to the digital trust economy - Yve...IDATE DigiWorld
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMeg Weber
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreichimec
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldAndris Soroka
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdf0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdfThiagoHenrique751166
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 

Semelhante a From Social Media Chaos to Social Business Security - Geneva 2014 (20)

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
DWS16 - Plenary - from the digital economy to the digital trust economy - Yve...
DWS16 - Plenary - from the digital economy to the digital trust economy - Yve...DWS16 - Plenary - from the digital economy to the digital trust economy - Yve...
DWS16 - Plenary - from the digital economy to the digital trust economy - Yve...
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreich
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdf0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdf
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Foresight Friday 19.01.2018 - Kari Hiekkanen
Foresight Friday 19.01.2018 - Kari Hiekkanen Foresight Friday 19.01.2018 - Kari Hiekkanen
Foresight Friday 19.01.2018 - Kari Hiekkanen
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 

Último

Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensSocioCosmos
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYdizinfo
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Delhi Call girls
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutioneliklein8
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRDelhi Call girls
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfeliklein8
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageSocioCosmos
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...ZurliaSoop
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for siteAshtonCains
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenSapana Sha
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfmacawdigitalseo2023
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosSocioCosmos
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrSapana Sha
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for siteAshtonCains
 

Último (20)

Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 

From Social Media Chaos to Social Business Security - Geneva 2014

  • 1. (ISC)2 Workshop – Geneva, 18-02-2014 “From Social Media Chaos to Social Business Security” Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 2. From Social Media Chaos to Social Business Security → Who am I (in 60 seconds) Andrea Zapparoli Manzoni  Founder, CEO, iDIALOGHI  «Cyberworld» WG Member at OSN/Ce.Mi.S.S.  APASS Board Member / Information Warfare lead res.  Assintel Board Member / ICT Security WG leader  Clusit Board Member / lecturer (SCADA, Social Media Sec, Anti-fraud, DLP…)  Co-author of the Clusit Report (2012, 2013 and 2014) Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 3. From Social Media Chaos to Social Business Security → Who am I (in 30 more seconds) Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 4. From Social Media Chaos to Social Business Security → Who am I (last 30 seconds, I promise) Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 5. From Social Media Chaos to Social Business Security → A (necessary) disclaimer The views hereby expressed are those of the Author / Speaker and do not reflect the views of CLUSIT, nor those of the WG “Cyber World” at OSN - Italian Ministry of Defense, nor those of the private enterprises and security communities I am working at/with and/or supporting. Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 6. From Social Media Chaos to Social Business Security →Why are we here?  2012: + 150% serious known cyberattacks in the world vs 2011  2012: +800% serious know cyberattacks against / through Social Media platforms  Huge growth of evil doers and of offensive capabilities all over the world  Everyone is now a target (Citizens, Corporations, Institutions, Gov/Mil)  All platforms are now a target (PCs, Mobile, Social, Cloud, SCADA, IoT, PoS…)  Traditional defenses are not working anymore  Return of Investment (ROI) for attackers is extremely high  Costs and Risks for attackers are still extremely low  Growing risk of systemic “Black Swans” (HILP)  Lack of effective legislation and tools for LEAs How do we handle all these issues and mitigate these new threats? Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 7. From Social Media Chaos to Social Business Security →Cyber Insecurity is the New Norm It’s a Jungle Out There International Serious Cyber Attacks 800 700 Private Organizations spent USD 20B for “advanced” ICT Security systems in 2012, out of a USD 60B budget for ICT Security spending. Nothwistanding these efforts, Cyber Insecurity is becoming the norm. 600 500 400 300 200 100 0 1 H 2011 2 H 2011 1 H 2012 2 H 2012 1 H 2013 © Clusit - Rapporto 2013 sulla Sicurezza ICT in Italia – June 2013 Update From our analyses, which are in line with those made by other observers (private and institutional), the rate of attacks against Companies and Government bodies in 2012 grew by 154% on average compared to 2011 (which was the worst year on record, until then). The speed of this growth has accelerated in 2013, too. Why? Andrea Zapparoli Manzoni - CEO iDialoghi © Clusit - Rapporto 2013 sulla Sicurezza ICT in Italia Geneva 18-02 2014
  • 8. From Social Media Chaos to Social Business Security → Reason # 1: ICT Products Security levels are not what you may think != The Fiat was my first car, back in 1987 (it was built in 1968). I was very proud of it and, after all, it worked. But it had NO built-in security whatsoever. No brakes, no seat belts, no ABS, ESP, airbag, headrests, no passive security – nothing. Today’s ICT is like my 1968 Fiat, in terms of built-in security. As a consequence, in 2012 this inherent cyber insecurity had a global (direct and indirect) estimated cost of USD 388 Billions (that is, Denmark’s GDP). Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 9. From Social Media Chaos to Social Business Security → Reason # 2: Cybercrime is the “best” investment on the planet Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 10. From Social Media Chaos to Social Business Security → Reason # 2 So many ways to profit from a compromised device! Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 11. From Social Media Chaos to Social Business Security → Threats are growing expecially on Social Media Threats to Online Services, including Social Media and Cloud Services: +800% Y/Y VITTIME PER TIPOLOGIA 2011 2012 Variazioni 2012 su 2011 Gov - Mil - LEAs - Intelligence 153 374 244,44% Others 97 194 200,00% Entertainment / News 76 175 230,26% Online Services / Cloud 15 136 806,67% Research - Education 26 104 400,00% Banking / Finance 17 59 347,06% SW / HW Vendor 27 59 218,52% Telco 11 19 172,73% Gov. Contractors / Cons. 18 15 -16,67% Security 17 14 -17,65% Religion 0 14 1400,00% Health 10 11 110,00% Chemical / Medical 2 9 450,00% Critical Infrastructures - - - Automotive - - - Org / ONG - - - © Clusit - Rapporto 2013 sulla Sicurezza ICT in Italia Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 12. From Social Media Chaos to Social Business Security → OK. But what are Social Media? Wikipedia: “A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content”. This is certainly true, but…  Why are they (mostly) free?  Who owns them (really)?  Who controls them (really)?  What do they do with everybody’s social graphs?  And with all the information?  And with all the pictures?  What’s written inside their EULAs ?  Are they filtered?  Are they neutral?  Are they secure? Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 13. From Social Media Chaos to Social Business Security → Social Media are also… weapons Over the last 3 years Social Media have become “weapons” in all respects, and are now part of the "cyber arsenal " at the disposal of armies, intelligence services, police forces, terrorists, mercenary groups, antagonistic groups and corporations. Some facts:  Actively used by Anonymous, S.E.A. (and similar groups)  Actively used by Governments (Iran, Syria, China, USA etc) to PsyOps, OSINT, mass surveillance and target acquisition  Used by the "Arab Spring" rebels as C4ISR1 and by Special Forces in Libya in support of NATO operations  Used by Corporations against competitors and hacktivists 1 Command, Control, Computers, Communications, Intelligence, Surveillance and Reconnaissance Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 14. From Social Media Chaos to Social Business Security → Social Media are also… targets (and SPoF) Having become a weapon and a battlefield, Social Media inevitably also became a target. This means that at any time could be attacked, blocked and made inaccessible, or unusable (i.e. by using swarms of “bots”, or by simply shutting them down). In fact it has already happened, because of: - Riots, insurrections and civil wars - Cyber ​attacks of various kinds and purpose - Sabotage and protest - State censorship Social Media platforms cannot (and shouldn’t) be trusted. Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 15. From Social Media Chaos to Social Business Security → Social Media are also… Cyber Crime Paradise Today Social Media have become the main hunting ground for trans-national organized cybercrime, which has reached a "turnover" in 2012 (estimated) of $ 15 Billion, an increase of 250% over the previous year. In 2012, 74 million people have been victims of some sort of cybercrime in the U.S. alone (1/3 via Social Media, 10 per second) for $ 32 B of direct losses. In the world the estimated direct losses in 2012 were over $ 110 B. The total cost worldwide (direct losses + costs & time devoted to remedy attacks) in 2012 was estimated at $ 388 B. It is more than the GDP of Vietnam, Ukraine and Romania added! If this trend continues, in 2013 these costs will be equal to half of the Italian GDP .... (1 Trillion USD). Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 16. From Social Media Chaos to Social Business Security → Social Media are also… a risk for their Users We could make thousands of examples, every day there are new ones…. I.E. taking advantage of the news of Bin Laden’s death, tens of thousands of Facebook users were lured into dowloading a trojan (not detected by antivirus software) that stealed personal data and transformed the PC of the victims into “zombies”… Due to the nature of social media, cyber criminals have the ability to infect millions of systems (PCs or mobile) in a matter of a few hours ... For free. Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 17. From Social Media Chaos to Social Business Security → Social Media are also… a risk for Businesses Social Media is an important source of business risk ... even for companies that do not use them! Cyber ​attacks, fraud, data, IP and money theft, unfair competition, damages to third parties and to the corporate image ... Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 18. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (latest Italian example) 120.000 Italian users exposed to Zeus malware for more than 48 hours on Alpitour’s hijacked FB page Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 19. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (more examples) Simple (but effective) social engineering attack for identity theft purposes Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 20. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (more examples) More Social Engineering (in these cases, in order to spread botnet malware / RATs). Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 21. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (more examples) Phishing via rogue Facebook App Andrea Zapparoli Manzoni - CEO iDialoghi Spear Phishing via LinkedIn Geneva 18-02 2014
  • 22. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (more examples) Mal-advertising: paid malicious ADVs (hint: there’s no WhatsApp for PCs…) Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 23. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (more examples) Social Media stolen credentials on sale on a (small) russian cybercriminal forum Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 24. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (more examples) Kaspersky 2013 Number of phishing attacks against Social Media users (august 2013) Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 25. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (more examples) PsyOps via Twitter (the “Syrian Electronic Army,” a pro-Assad mercenary group, hacked AP’s twitter account and then…) Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 26. From Social Media Chaos to Social Business Security → Social Media are a major attack vector (more examples) A single, well crafted fake tweet inflicted the NYSE a 53B USD loss in 5 minutes. What if …… ? Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 27. From Social Media Chaos to Social Business Security → The Path From Chaos to Security Knowledge is power. In such a new and complex context it is necessary to set up a continuous training process for Managers, End users, Decision Makers, LEAs, Marketing staff, HR staff, ICT / Security staff, and so on. Since incidents are only a matter of time, it is essential to implement a set of processes for Risk Management / BIA, harmonized and coordinated within an overall plan for Social Media Security: - Definition of specific Policies and Responsibilities - Continuous Monitoring and Enforcement of the policies - Cyber Threat Prevention / Cyber Intelligence - Definition of Early Warning indicators - Legal protection (proactive and reactive) - Crisis Management (in real-time!) Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014
  • 28. From Social Media Chaos to Social Business Security → Thank you! Andrea Zapparoli Manzoni a.zmanzoni@idialoghi.com Andrea Zapparoli Manzoni - CEO iDialoghi Geneva 18-02 2014