Início
Conheça mais
Enviar pesquisa
Carregar
Entrar
Cadastre-se
Anúncio
Check these out next
Network security
Sri Manakula Vinayagar Engineering College
Data security in local network using distributed firewall ppt
Sabreen Irfana
DDOS ATTACK - MIRAI BOTNET
Sukhdeep Singh Sandhu
Firewall
thinkahead.net
Wireless Network Security
Gyana Ranjana
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
Internet of Things Security Patterns
Mark Benson
NDIA 2021 - solar winds overview and takeaways
Bryson Bort
1
de
11
Top clipped slide
The Post Covid-19 Cybersecurity World - Where Is It Headed?
12 de Jun de 2021
•
0 gostou
0 gostaram
×
Seja o primeiro a gostar disto
mostrar mais
•
144 visualizações
visualizações
×
Vistos totais
0
No Slideshare
0
De incorporações
0
Número de incorporações
0
Baixar agora
Baixar para ler offline
Denunciar
Internet
The Post Covid-19 Cybersecurity World - Where Is It Headed?
Bangladesh Network Operators Group
Seguir
bdNOG
Anúncio
Anúncio
Anúncio
Recomendados
Supply Chain Attack Backdooring Your Networks
Bangladesh Network Operators Group
405 visualizações
•
40 slides
Extending Network Visibility: Down to the Endpoint
Lancope, Inc.
645 visualizações
•
21 slides
Topics in network security
Nasir Bhutta
9.9K visualizações
•
11 slides
StealthWatch & Point-of-Sale (POS) Malware
Lancope, Inc.
6.3K visualizações
•
26 slides
IoT - the Next Wave of DDoS Threat Landscape
APNIC
1.1K visualizações
•
34 slides
Network security - Defense in Depth
Dilum Bandara
5.6K visualizações
•
91 slides
Mais conteúdo relacionado
Apresentações para você
(20)
Network security
Sri Manakula Vinayagar Engineering College
•
118 visualizações
Data security in local network using distributed firewall ppt
Sabreen Irfana
•
13.5K visualizações
DDOS ATTACK - MIRAI BOTNET
Sukhdeep Singh Sandhu
•
218 visualizações
Firewall
thinkahead.net
•
793 visualizações
Wireless Network Security
Gyana Ranjana
•
1.6K visualizações
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
•
1.5K visualizações
Internet of Things Security Patterns
Mark Benson
•
515 visualizações
NDIA 2021 - solar winds overview and takeaways
Bryson Bort
•
165 visualizações
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SWITCHPOINT NV/SA
•
426 visualizações
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
•
3.1K visualizações
Firewall girija ppt
Girija Sankar Dash
•
1.8K visualizações
Windows firewall
VC Infotech
•
1.4K visualizações
How to stay protected against ransomware
Sophos Benelux
•
2.4K visualizações
Network Security Tools and applications
webhostingguy
•
2.2K visualizações
Cyber Attack Survival: Are You Ready?
Radware
•
4.1K visualizações
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
Shah Sheikh
•
1.3K visualizações
Another proposal
King Portipher
•
609 visualizações
SonicWALL Advanced Features
David Perkins
•
641 visualizações
network security, group policy and firewalls
Sapna Kumari
•
2.8K visualizações
Firewall
Amuthavalli Nachiyar
•
40.9K visualizações
Similar a The Post Covid-19 Cybersecurity World - Where Is It Headed?
(20)
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
TI Safe
•
34 visualizações
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Unisys Corporation
•
828 visualizações
Cyber Security
frcarlson
•
477 visualizações
Compliance made easy. Pass your audits stress-free.
AlgoSec
•
207 visualizações
Webinar: Insights from CYREN's Q3 trend report
Cyren, Inc
•
280 visualizações
IoT DDoS Attacks: the stakes have changed
Great Bay Software
•
599 visualizações
How to make the move towards hybrid cloud computing
David Strom
•
953 visualizações
SCADA Security: The Five Stages of Cyber Grief
Lancope, Inc.
•
1.1K visualizações
Spikes Security Isla Isolation
Cybryx
•
1.3K visualizações
Vpn alternative whitepaper
Cristian Garcia G.
•
27 visualizações
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
•
436 visualizações
Cybersecurity.pptx
John Donahue
•
28 visualizações
[CLASS 2014] Palestra Técnica - Michael Firstenberg
TI Safe
•
591 visualizações
BYOD and Your Business
cherienetclarity
•
566 visualizações
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
•
307 visualizações
Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore
Great Bay Software
•
293 visualizações
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Tarek Nader
•
1.5K visualizações
Security and control in Management Information System
Satya P. Joshi
•
10.2K visualizações
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
•
2.8K visualizações
2014CyberSecurityProject
Kaley Hair
•
63 visualizações
Anúncio
Mais de Bangladesh Network Operators Group
(20)
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
•
38 visualizações
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
•
79 visualizações
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
•
37 visualizações
An Overview about open UDP Services
Bangladesh Network Operators Group
•
208 visualizações
12 Years in DNS Security As a Defender
Bangladesh Network Operators Group
•
93 visualizações
Contents Localization Initiatives to get better User Experience
Bangladesh Network Operators Group
•
61 visualizações
BdNOG-20220625-MT-v6.0.pptx
Bangladesh Network Operators Group
•
67 visualizações
Route Leak Prevension with BGP Community
Bangladesh Network Operators Group
•
92 visualizações
Tale of a New Bangladeshi NIX
Bangladesh Network Operators Group
•
65 visualizações
MANRS for Network Operators
Bangladesh Network Operators Group
•
42 visualizações
Re-define network visibility for capacity planning & forecasting with Grafana
Bangladesh Network Operators Group
•
80 visualizações
RPKI ROA updates
Bangladesh Network Operators Group
•
19 visualizações
Blockchain Demystified
Bangladesh Network Operators Group
•
72 visualizações
Measuring the Internet Economy: How Networks Create Value
Bangladesh Network Operators Group
•
256 visualizações
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
•
151 visualizações
Route Origin Validation - A MANRS Approach
Bangladesh Network Operators Group
•
157 visualizações
31, Get more from your IPv4 resources
Bangladesh Network Operators Group
•
3.1K visualizações
Secured Internet Gateway for ISP with pfsense & FRR
Bangladesh Network Operators Group
•
501 visualizações
EVPN Introduction
Bangladesh Network Operators Group
•
681 visualizações
Social CDN Business : Paid or Free - bdNOG12 Panel Discussion
Bangladesh Network Operators Group
•
802 visualizações
Último
(20)
01_clere_Having fun with a solar panel, camera and raspberry. How with a few ...
Jean-Frederic Clere
•
0 visão
cahaya.pptx
RezaMahendra31
•
1 visão
ThaiNOG 5: Security Tutorial
APNIC
•
0 visão
2fdck.pdf
DenisePrice18
•
0 visão
美国荷华大学毕业证文凭成绩单制作指南
abecue
•
0 visão
德国柏林自由大学毕业证文凭成绩单制作指南
abecue
•
0 visão
美国霍华德大学毕业证文凭成绩单制作指南
abecue
•
0 visão
英国金融国际服务协会大学学院毕业证文凭成绩单制作指南
nahej99297
•
2 visualizações
美国雪城大学毕业证文凭成绩单制作指南
abecue
•
0 visão
澳洲维多利亚大学毕业证文凭成绩单制作指南
abecue
•
0 visão
英国纽卡斯尔大学毕业证文凭成绩单制作指南
abecue
•
0 visão
PLNOG 31 Alena Muravska 2023.pdf
RIPE NCC
•
0 visão
WORKING WITH FILES AND FOLDERS OR DIRECTORIES.pptx
GessabelMatugas1
•
1 visão
NP Industry in India.pdf
Karthik Ramanujam
•
0 visão
skywind-w88
w88 hey
•
0 visão
ADDING, RENAMING, MOVING, COPYING,.pptx
GessabelMatugas1
•
1 visão
美国卡罗莱纳大学毕业证文凭成绩单制作指南
abecue
•
0 visão
英国萨塞克斯大学毕业证文凭成绩单制作指南
abecue
•
0 visão
playn-go-w88
w88 hey
•
0 visão
BLACK&WHITE projects 5 - manual.pdf
Rosduz
•
2 visualizações
Anúncio
The Post Covid-19 Cybersecurity World - Where Is It Headed?
1 © UNIPHORE 2021
uniphore.com The Post Covid-19 Cybersecurity World: Where Is It Headed? bdNOG13 June 12, 2021 Merike Kaeo, CISO (merike.kaeo@uniphore.com)
2 © UNIPHORE 2021
uniphore.com DAILY BREACHES AND RANSOMWARE ATTACKS – THE VIRTUAL PANDEMIC
3 © UNIPHORE 2021
uniphore.com WHY ARE THINGS SO BROKEN? Scale • Billions of new devices • Large amounts of bandwidth Criminal Sophistication • Network architecture clue • Prevalent use of tunneling • More use of encryption • Social media ‘weaponization’ Automation • Outsourced infrastructures • Persistent continuous attacks on targets
4 © UNIPHORE 2021
uniphore.com THE REALITIES OF WORKING FROM HOME • Increased Stress • Less Privacy • Multiple Demands • Shared Devices • Shared Network • No Physical Security
5 © UNIPHORE 2021
uniphore.com COVID-19 EXACERBATED ONLINE CRIME • Increased Threat Vectors • Home networks • VPN (lack of) • Routing/DNS • Emails • Unresolved Technical Debt • RPKI • DNSSEC • Digital Certificate Management • Ineffective Monitoring
6 © UNIPHORE 2021
uniphore.com STEALING CREDENTIALS IS TOO EASY Being a victim of a phishing attack Laptop gets stolen Sharing your password with another person Re-using same password on many systems Spyware on your computer installed a keylogger Storing your private key in an easily accessed file Sending credentials in cleartext emails Unpatched security vulnerabilities are exploited HUMAN TECH
7 © UNIPHORE 2021
uniphore.com WE HAVE BLIND TRUST ISSUES • Protocol Standards • Implementation Guidelines • Device Certifications • Compliance Mandates • Documented Policies But…There’s The Human Factor You can do everything right and still screw up Question the status quo
8 © UNIPHORE 2021
uniphore.com INCIDENT RESPONSE NEEDS IMPROVEMENT Everyone Gets Vilified • Why not detected sooner • Why not fixed quicker • Why notifications delayed Issues To Be Resolved • Breach notification laws • Lack of transparency • Escalation chain • Cross sector sharing (DNS, ISP) • Media hype with incomplete information
9 © UNIPHORE 2021
uniphore.com THE BASIC DETAILS NEED ATTENTION Incident Response / Crisis Plan • Routing and DNS Compromise Vulnerability Disclosure/Patch Plan Fundamental Security Controls • User Authentication/Authorization • Device Authentication/Authorization • Access Control (Packet/Route Filtering) • Data Integrity • Data Confidentiality • Auditing / Logging • DoS Mitigation Most Basic Security Controls Minimize Impact Of Sophisticated Attacks • Don’t rely on defaults • Implement 2FA • Use cryptographically protected protocols • Get alerted for unauthorized changes
10 © UNIPHORE 2021
uniphore.com Home workstations are now ‘mobile devices’ • What level of control do you have? • What is backed up where? • What is going into a personal cloud? • Who has access to devices? • Who uses screen savers at home? Single home router for Internet access • Where is traffic going? • Can traffic be observed? • Where are DNS queries going? HOME NETWORK AS EXTENSION OF BUSINESS Think Before You Click Lock Down Your Login Connect Via Secure Network Separate Your Networks Limit Access To Work Devices Update Your Software
11 © UNIPHORE 2021
uniphore.com THANK YOU !
Anúncio