SlideShare uma empresa Scribd logo
1 de 11
The Reading Room, 14th December 2013
Drew Graham, CTO
drew@evtech.asia
www.evantage-technology.com +65 6592 5450
“eVantage Technology allows me to sleep
sounder at night.”
- Mike Meade, CEO, M3 Marine
Office 365 migrations and services
Microsoft hybrid cloud solutions
Contract support and outsourced CTO
“IT is the 4th utility service. The eVantage
Technology team are proactive in their
approach and allow our staff to focus on their
business.”
- Andy Currie, CIO, Swire OS
Singapore - Hong Kong - Myanmar
www.evantage-technology.com +65 6592 5450
1. Evolution of Cybercrime
2. Future of Cybercrime
3. Mass “Consumer” Attacks
4. Targeted Attacks
www.evantage-technology.com +65 6592 5450
1980s
Bedroom hackers
Annoying viruses
1990s
Commercial hackers
Viruses winning
2000s
Hugely profitable
Botnets
2010s
State hacking
Information stealing
www.evantage-technology.com +65 6592 5450
State
Cyber ”crime”
Lower
Threshold For
Targeted Attacks
Mass Social
Engineering
www.evantage-technology.com +65 6592 5450
Why do Nigerian “419” scammers
say that they’re from Nigeria?
Cormac Herley, Microsoft Research
www.evantage-technology.com +65 6592 5450
“You don’t have to run faster than
the bear to get away. You just have
to run faster than the guy next to
you.”
Jim Butcher, Author
www.evantage-technology.com +65 6592 5450
“If you protect your paper clips and
diamonds with equal vigour, you’ll
soon have more paper clips and
fewer diamonds.”
Dean Rusk, US Secretary of State, 1961-1969
www.evantage-technology.com +65 6592 5450
“Why do I rob banks? Because that’s
where the money is.”
Willie Sutton, Bank Robber
www.evantage-technology.com +65 6592 5450
Paper Clips
• User education
• Centralised anti-virus
software
• Keep software patched
• Firewalls
Diamonds
• Isolate your networks
• Secondary access
requirements
• Two factor
authentication
• Encrypt your diamonds
www.evantage-technology.com +65 6592 5450
Singapore - Hong Kong - Myanmar
Drew Graham, CTO
drew@evtech.asia
www.evantage-technology.com +65 6592 5450

Mais conteúdo relacionado

Mais procurados

Michael curry security
Michael curry securityMichael curry security
Michael curry securityMassTLC
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Antoine Chaya
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewJohn D. Haden
 
Location: Trends, Ethics & Diversity
Location: Trends, Ethics & DiversityLocation: Trends, Ethics & Diversity
Location: Trends, Ethics & DiversityPLACE
 
Cloud computing fact or fiction
Cloud computing fact or fictionCloud computing fact or fiction
Cloud computing fact or fictionsteven hasting
 
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneSecrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneDavid Terrar
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityJean-Luc David
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularitytheodorekristiniak
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2016
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyHB Litigation Conferences
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 

Mais procurados (20)

Michael curry security
Michael curry securityMichael curry security
Michael curry security
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
 
L123
L123L123
L123
 
Location: Trends, Ethics & Diversity
Location: Trends, Ethics & DiversityLocation: Trends, Ethics & Diversity
Location: Trends, Ethics & Diversity
 
Cloud computing fact or fiction
Cloud computing fact or fictionCloud computing fact or fiction
Cloud computing fact or fiction
 
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneSecrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart Security
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
 
Top Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart InfrastructureTop Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart Infrastructure
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Destaque

Basic ICT Myanmar
Basic ICT MyanmarBasic ICT Myanmar
Basic ICT MyanmarFreddy Lynn
 
Meaning and concept of ict
Meaning and concept of ictMeaning and concept of ict
Meaning and concept of ictSuresh Kumar
 
Operating system 11.10.2016 adarsh bang
Operating system 11.10.2016 adarsh bangOperating system 11.10.2016 adarsh bang
Operating system 11.10.2016 adarsh bangadarshbang1998
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareDr. Ahmed Al Zaidy
 
My presentation on 'computer hardware component' {hardware}
My presentation on 'computer hardware component' {hardware}My presentation on 'computer hardware component' {hardware}
My presentation on 'computer hardware component' {hardware}Rahul Kumar
 
A Power Supply (Complete)
A Power Supply (Complete)A Power Supply (Complete)
A Power Supply (Complete)Arif Nazeer
 
Power Supply Project
Power Supply ProjectPower Supply Project
Power Supply Projectusmanhadi91
 
Processor powerpoint
Processor powerpointProcessor powerpoint
Processor powerpointbrennan_jame
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processorsagar solanky
 

Destaque (17)

Internal hardware
Internal hardwareInternal hardware
Internal hardware
 
Basic ICT Myanmar
Basic ICT MyanmarBasic ICT Myanmar
Basic ICT Myanmar
 
Meaning and concept of ict
Meaning and concept of ictMeaning and concept of ict
Meaning and concept of ict
 
Internal hardware
Internal hardwareInternal hardware
Internal hardware
 
Power supply
Power supplyPower supply
Power supply
 
Jireh ict
Jireh ictJireh ict
Jireh ict
 
Operating system 11.10.2016 adarsh bang
Operating system 11.10.2016 adarsh bangOperating system 11.10.2016 adarsh bang
Operating system 11.10.2016 adarsh bang
 
Comp hardware Introduction
Comp hardware IntroductionComp hardware Introduction
Comp hardware Introduction
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
My presentation on 'computer hardware component' {hardware}
My presentation on 'computer hardware component' {hardware}My presentation on 'computer hardware component' {hardware}
My presentation on 'computer hardware component' {hardware}
 
A Power Supply (Complete)
A Power Supply (Complete)A Power Supply (Complete)
A Power Supply (Complete)
 
Power Supply
Power SupplyPower Supply
Power Supply
 
Power Supply Project
Power Supply ProjectPower Supply Project
Power Supply Project
 
Processor powerpoint
Processor powerpointProcessor powerpoint
Processor powerpoint
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processor
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Power supply
Power supplyPower supply
Power supply
 

Semelhante a Evantage Technology Cybersecurity presentation

Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystTuan Yang
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetTechugo
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdfinsightssuccess2
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 
Digital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018VARINDIA
 
The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksSaumil Shah
 
The 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfThe 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfCIO Look Magazine
 
The future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act nowThe future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act nowJoshua Nomwesigwa
 
E- magazine May-2017
E- magazine May-2017E- magazine May-2017
E- magazine May-2017VARINDIA
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 

Semelhante a Evantage Technology Cybersecurity presentation (20)

Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence Analyst
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
Digital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration Datasheet
 
Disrupt or be disrupted
Disrupt or be disruptedDisrupt or be disrupted
Disrupt or be disrupted
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018
 
The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also Blocks
 
The 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfThe 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdf
 
The future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act nowThe future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act now
 
E- magazine May-2017
E- magazine May-2017E- magazine May-2017
E- magazine May-2017
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 

Mais de Reading Room

National Archives - C is for Content Event
National Archives - C is for Content EventNational Archives - C is for Content Event
National Archives - C is for Content EventReading Room
 
C is for content final happy hour
C is for content final happy hourC is for content final happy hour
C is for content final happy hourReading Room
 
4 reading room presentation kingspan content
4  reading room presentation kingspan content4  reading room presentation kingspan content
4 reading room presentation kingspan contentReading Room
 
3 mark b catalyst social content presentation
3   mark b catalyst   social content presentation3   mark b catalyst   social content presentation
3 mark b catalyst social content presentationReading Room
 
The next level in personalisation
The next level in personalisationThe next level in personalisation
The next level in personalisationReading Room
 
An introduction to multi channel content strategy
An introduction to multi channel content strategyAn introduction to multi channel content strategy
An introduction to multi channel content strategyReading Room
 
Creating exceptional experiences in a multi-devices world
Creating exceptional experiences in a multi-devices worldCreating exceptional experiences in a multi-devices world
Creating exceptional experiences in a multi-devices worldReading Room
 
3 myths about digital conversion
3 myths about digital conversion3 myths about digital conversion
3 myths about digital conversionReading Room
 
Dating a millennial – the path to purchase model
Dating a millennial – the path to purchase modelDating a millennial – the path to purchase model
Dating a millennial – the path to purchase modelReading Room
 
Digital Readiness - Get your business ready for digital change
Digital Readiness - Get your business ready for digital changeDigital Readiness - Get your business ready for digital change
Digital Readiness - Get your business ready for digital changeReading Room
 
Inside Consumers' Mind - A whitepaper by Reading Room
Inside Consumers' Mind - A whitepaper by Reading RoomInside Consumers' Mind - A whitepaper by Reading Room
Inside Consumers' Mind - A whitepaper by Reading RoomReading Room
 
Developing seamless consumer experiences across multichannel platforms
Developing seamless consumer experiences across multichannel platformsDeveloping seamless consumer experiences across multichannel platforms
Developing seamless consumer experiences across multichannel platformsReading Room
 
Why the humble whiteboard will trump technology in 2015
Why the humble whiteboard will trump technology in 2015Why the humble whiteboard will trump technology in 2015
Why the humble whiteboard will trump technology in 2015Reading Room
 
Enough Psycho- Babble ... Show me
Enough Psycho- Babble ... Show meEnough Psycho- Babble ... Show me
Enough Psycho- Babble ... Show meReading Room
 
Sitecore: Web psychology and customer experience
Sitecore:  Web psychology and customer experienceSitecore:  Web psychology and customer experience
Sitecore: Web psychology and customer experienceReading Room
 
The importance of behavioural psychology on digital strategy
The importance of behavioural psychology on digital strategyThe importance of behavioural psychology on digital strategy
The importance of behavioural psychology on digital strategyReading Room
 
Choice in digital – Can you have too much of a good thing?
Choice in digital – Can you have too much of a good thing?Choice in digital – Can you have too much of a good thing?
Choice in digital – Can you have too much of a good thing?Reading Room
 
Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...Reading Room
 

Mais de Reading Room (20)

National Archives - C is for Content Event
National Archives - C is for Content EventNational Archives - C is for Content Event
National Archives - C is for Content Event
 
C is for content final happy hour
C is for content final happy hourC is for content final happy hour
C is for content final happy hour
 
4 reading room presentation kingspan content
4  reading room presentation kingspan content4  reading room presentation kingspan content
4 reading room presentation kingspan content
 
3 mark b catalyst social content presentation
3   mark b catalyst   social content presentation3   mark b catalyst   social content presentation
3 mark b catalyst social content presentation
 
Digital Branding
Digital BrandingDigital Branding
Digital Branding
 
Digital Branding
Digital BrandingDigital Branding
Digital Branding
 
The next level in personalisation
The next level in personalisationThe next level in personalisation
The next level in personalisation
 
An introduction to multi channel content strategy
An introduction to multi channel content strategyAn introduction to multi channel content strategy
An introduction to multi channel content strategy
 
Creating exceptional experiences in a multi-devices world
Creating exceptional experiences in a multi-devices worldCreating exceptional experiences in a multi-devices world
Creating exceptional experiences in a multi-devices world
 
3 myths about digital conversion
3 myths about digital conversion3 myths about digital conversion
3 myths about digital conversion
 
Dating a millennial – the path to purchase model
Dating a millennial – the path to purchase modelDating a millennial – the path to purchase model
Dating a millennial – the path to purchase model
 
Digital Readiness - Get your business ready for digital change
Digital Readiness - Get your business ready for digital changeDigital Readiness - Get your business ready for digital change
Digital Readiness - Get your business ready for digital change
 
Inside Consumers' Mind - A whitepaper by Reading Room
Inside Consumers' Mind - A whitepaper by Reading RoomInside Consumers' Mind - A whitepaper by Reading Room
Inside Consumers' Mind - A whitepaper by Reading Room
 
Developing seamless consumer experiences across multichannel platforms
Developing seamless consumer experiences across multichannel platformsDeveloping seamless consumer experiences across multichannel platforms
Developing seamless consumer experiences across multichannel platforms
 
Why the humble whiteboard will trump technology in 2015
Why the humble whiteboard will trump technology in 2015Why the humble whiteboard will trump technology in 2015
Why the humble whiteboard will trump technology in 2015
 
Enough Psycho- Babble ... Show me
Enough Psycho- Babble ... Show meEnough Psycho- Babble ... Show me
Enough Psycho- Babble ... Show me
 
Sitecore: Web psychology and customer experience
Sitecore:  Web psychology and customer experienceSitecore:  Web psychology and customer experience
Sitecore: Web psychology and customer experience
 
The importance of behavioural psychology on digital strategy
The importance of behavioural psychology on digital strategyThe importance of behavioural psychology on digital strategy
The importance of behavioural psychology on digital strategy
 
Choice in digital – Can you have too much of a good thing?
Choice in digital – Can you have too much of a good thing?Choice in digital – Can you have too much of a good thing?
Choice in digital – Can you have too much of a good thing?
 
Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...
 

Último

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 

Último (20)

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 

Evantage Technology Cybersecurity presentation

  • 1. The Reading Room, 14th December 2013 Drew Graham, CTO drew@evtech.asia www.evantage-technology.com +65 6592 5450
  • 2. “eVantage Technology allows me to sleep sounder at night.” - Mike Meade, CEO, M3 Marine Office 365 migrations and services Microsoft hybrid cloud solutions Contract support and outsourced CTO “IT is the 4th utility service. The eVantage Technology team are proactive in their approach and allow our staff to focus on their business.” - Andy Currie, CIO, Swire OS Singapore - Hong Kong - Myanmar www.evantage-technology.com +65 6592 5450
  • 3. 1. Evolution of Cybercrime 2. Future of Cybercrime 3. Mass “Consumer” Attacks 4. Targeted Attacks www.evantage-technology.com +65 6592 5450
  • 4. 1980s Bedroom hackers Annoying viruses 1990s Commercial hackers Viruses winning 2000s Hugely profitable Botnets 2010s State hacking Information stealing www.evantage-technology.com +65 6592 5450
  • 5. State Cyber ”crime” Lower Threshold For Targeted Attacks Mass Social Engineering www.evantage-technology.com +65 6592 5450
  • 6. Why do Nigerian “419” scammers say that they’re from Nigeria? Cormac Herley, Microsoft Research www.evantage-technology.com +65 6592 5450
  • 7. “You don’t have to run faster than the bear to get away. You just have to run faster than the guy next to you.” Jim Butcher, Author www.evantage-technology.com +65 6592 5450
  • 8. “If you protect your paper clips and diamonds with equal vigour, you’ll soon have more paper clips and fewer diamonds.” Dean Rusk, US Secretary of State, 1961-1969 www.evantage-technology.com +65 6592 5450
  • 9. “Why do I rob banks? Because that’s where the money is.” Willie Sutton, Bank Robber www.evantage-technology.com +65 6592 5450
  • 10. Paper Clips • User education • Centralised anti-virus software • Keep software patched • Firewalls Diamonds • Isolate your networks • Secondary access requirements • Two factor authentication • Encrypt your diamonds www.evantage-technology.com +65 6592 5450
  • 11. Singapore - Hong Kong - Myanmar Drew Graham, CTO drew@evtech.asia www.evantage-technology.com +65 6592 5450