SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
HACKING PARA PME´S
CYBERSECURITY WITH OPENSOURCE
WWW.CYBERS3C.PT
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
ABOUT ME
Sérgio Silva
ssilva@cybersec.pt
I used to work for the government
I founded CyberSec, so that i could be a
CEO on Linkedin
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
ABOUT ME
You can find me on main Social Networks
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
DISCLAIMER
SPECIALLY FOR THIS EVENT, I HAVE MADE A ENGLISH
CRASH COURSE
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
WHY OPENSOURCE ?
WHY SHOULD YOU PROTECT YOUR ORGANIZATION
WITH OPENSOURCE ?
FREEDOM OF CHOICE
FREEDOM TO CHANGE SOURCE CODE
FREEDOM TO CHECK SOURCE CODE
SUPPORT OF THE COMMUNITY
ONE SOLUTION MANY CLIENTS
IT´S SEXY ( GEEK TALK )
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
WHY OPENSOURCE ?
WHY SHOULD YOU NOT PROTECT YOUR
ORGANIZATION WITH OPENSOURCE ?
BECAUSE IF YOU USE OPEN SOURCE THERE IS NO ONE
TO BLAME !
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
LET´S BEGIN
CYBER ATTACKS
BEFORE
DURING
AFTER
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
BEFORE ATTACK
WE MUST BE PREPARED
• VULNERABILITY ASSESSMENT
• PEN TESTING
• TRAINING
• DEFENCE MECHANISM
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
OSINT YOUR ORGANIZATION
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
OSINT YOUR ORGANIZATION
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
NETWORK SCANNER
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
VULNERABILITY ASSESSMENT
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
PEN TESTING
ZED
ATTACK
PROXY
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
BREACH AND ATTACK SIMULATION
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
OPEN-SOURCE PHISHING FRAMEWORK
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
REQUIREMENTS
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
BUT... NO MONEY
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
DO NOT FEAR … OPEN SOURCE IS HERE
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
SECURITY ONION
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
ELASTICSEARCH, LOGSTASH, KIBANA, SNORT,
SURICATA, BRO, WAZUH, SGUIL, SQUERT,
NETWORKMINER
ALL INSIDE
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
VERY HARD TO INSTALL ( NOT )
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
GDPR
DEPENDING ON THE CIRCUMSTANCES,
AN EFFECTIVE AND APPROPRIATE
ENCRYPTION SOLUTION CAN ALSO BE
A MEANS OF DEMONSTRATING
COMPLIANCE WITH THE SECURITY
REQUIREMENTS OF THE GDPR
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
ENCRYPTION SOLUTION
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
GDPR - Privacy Impact Assessment
The instrument for a privacy impact assessment
(PIA) or data protection impact assessment (DPIA)
was introduced with the General Data Protection
Regulation (Art. 35 of the GDPR). This refers to the
obligation of the controller to conduct an impact
assessment and to document it before starting the
intended data processing.
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
GDPR - Privacy Impact Assessment
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
GDPR - Privacy Impact Assessment
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
GDPR - Privacy Impact Assessment
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
GDPR - Privacy Impact Assessment
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
Forensic tools
THE SIFT WORKSTATION IS
A GROUP OF FREE OPEN-
SOURCE INCIDENT
RESPONSE AND FORENSIC
TOOLS DESIGNED TO
PERFORM DETAILED
DIGITAL FORENSIC
EXAMINATIONS IN A
VARIETY OF SETTINGS
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
CONCLUSIONS
YOU CAN USE OPENSOURCE TO PROTECT YOUR
ORGANIZATION;
THERE ARE OPENSOURCE SOLUTIONS FOR EVERY STAGES
OF AN CYBERATTACK;
YOU DON´T NEED TO SPEND A LOT OF MONEY;
MY ENGLISH IS VERY BAD.
CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE
THANKYOU

Mais conteúdo relacionado

Mais procurados

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 

Mais procurados (20)

Techowl- Wazuh.pdf
Techowl- Wazuh.pdfTechowl- Wazuh.pdf
Techowl- Wazuh.pdf
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
STIX2-TAXII2_Update
STIX2-TAXII2_UpdateSTIX2-TAXII2_Update
STIX2-TAXII2_Update
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and Identity
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Containerizing your Security Operations Center
Containerizing your Security Operations CenterContainerizing your Security Operations Center
Containerizing your Security Operations Center
 
Cloud security
Cloud security Cloud security
Cloud security
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
 
Malware classification using Machine Learning
Malware classification using Machine LearningMalware classification using Machine Learning
Malware classification using Machine Learning
 
Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices
 
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | EdurekaCloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
 

Mais de marketingsyone

Mais de marketingsyone (20)

Eneko Astigarraga - ELSE - OSL19
Eneko Astigarraga - ELSE - OSL19Eneko Astigarraga - ELSE - OSL19
Eneko Astigarraga - ELSE - OSL19
 
Jean Christophe - Aquinetic - OSL19
Jean Christophe - Aquinetic - OSL19Jean Christophe - Aquinetic - OSL19
Jean Christophe - Aquinetic - OSL19
 
Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19
 
David Buckhurst - BBC - OSL19
David Buckhurst - BBC - OSL19David Buckhurst - BBC - OSL19
David Buckhurst - BBC - OSL19
 
Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19Juarez Barbosa Junior - Microsoft - OSL19
Juarez Barbosa Junior - Microsoft - OSL19
 
Rui Violante - Syone - OSL19
Rui Violante - Syone - OSL19Rui Violante - Syone - OSL19
Rui Violante - Syone - OSL19
 
João Faria - Syone - OSL19
João Faria - Syone - OSL19João Faria - Syone - OSL19
João Faria - Syone - OSL19
 
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
 
Tiago Carrondo - Ubuntu - OSL19
Tiago Carrondo - Ubuntu - OSL19Tiago Carrondo - Ubuntu - OSL19
Tiago Carrondo - Ubuntu - OSL19
 
Sergio Seabra - Red Hat - OSL19
Sergio Seabra - Red Hat - OSL19Sergio Seabra - Red Hat - OSL19
Sergio Seabra - Red Hat - OSL19
 
Miguel Vera - Unbabel - OSL19
Miguel Vera - Unbabel - OSL19Miguel Vera - Unbabel - OSL19
Miguel Vera - Unbabel - OSL19
 
Luis Correia - Instituto de Informática - OSL19
Luis Correia - Instituto de Informática - OSL19Luis Correia - Instituto de Informática - OSL19
Luis Correia - Instituto de Informática - OSL19
 
François Cartegnie - VideoLAN - OSL19
François Cartegnie - VideoLAN - OSL19François Cartegnie - VideoLAN - OSL19
François Cartegnie - VideoLAN - OSL19
 
Filipe Barroso - Google Developers Group - OSL19
Filipe Barroso - Google Developers Group - OSL19Filipe Barroso - Google Developers Group - OSL19
Filipe Barroso - Google Developers Group - OSL19
 
Jose Manrique - OSPO - OSL19
Jose Manrique - OSPO - OSL19Jose Manrique - OSPO - OSL19
Jose Manrique - OSPO - OSL19
 
Francisco Javier Ramirez Urea - Hopla - OSL19
Francisco Javier Ramirez Urea - Hopla - OSL19Francisco Javier Ramirez Urea - Hopla - OSL19
Francisco Javier Ramirez Urea - Hopla - OSL19
 
Ricardo Fiel - Microsoft - OSL19
Ricardo Fiel - Microsoft - OSL19Ricardo Fiel - Microsoft - OSL19
Ricardo Fiel - Microsoft - OSL19
 
Paulo Ribeiro - ESOP - OSL19
Paulo Ribeiro - ESOP - OSL19Paulo Ribeiro - ESOP - OSL19
Paulo Ribeiro - ESOP - OSL19
 
Despina Mitropoulou (open room) - GFOSS - OSL19
Despina Mitropoulou (open room) - GFOSS - OSL19Despina Mitropoulou (open room) - GFOSS - OSL19
Despina Mitropoulou (open room) - GFOSS - OSL19
 
Regina Pison - Elastic - OSL19
Regina Pison - Elastic - OSL19Regina Pison - Elastic - OSL19
Regina Pison - Elastic - OSL19
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Sergio Silva - CyberS3c - OSL19

  • 1. HACKING PARA PME´S CYBERSECURITY WITH OPENSOURCE WWW.CYBERS3C.PT
  • 2. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE ABOUT ME Sérgio Silva ssilva@cybersec.pt I used to work for the government I founded CyberSec, so that i could be a CEO on Linkedin
  • 3. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE ABOUT ME You can find me on main Social Networks
  • 4. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE DISCLAIMER SPECIALLY FOR THIS EVENT, I HAVE MADE A ENGLISH CRASH COURSE
  • 5. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE WHY OPENSOURCE ? WHY SHOULD YOU PROTECT YOUR ORGANIZATION WITH OPENSOURCE ? FREEDOM OF CHOICE FREEDOM TO CHANGE SOURCE CODE FREEDOM TO CHECK SOURCE CODE SUPPORT OF THE COMMUNITY ONE SOLUTION MANY CLIENTS IT´S SEXY ( GEEK TALK )
  • 6. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE WHY OPENSOURCE ? WHY SHOULD YOU NOT PROTECT YOUR ORGANIZATION WITH OPENSOURCE ? BECAUSE IF YOU USE OPEN SOURCE THERE IS NO ONE TO BLAME !
  • 7. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE LET´S BEGIN CYBER ATTACKS BEFORE DURING AFTER
  • 8. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE BEFORE ATTACK WE MUST BE PREPARED • VULNERABILITY ASSESSMENT • PEN TESTING • TRAINING • DEFENCE MECHANISM
  • 9. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE OSINT YOUR ORGANIZATION
  • 10. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE OSINT YOUR ORGANIZATION
  • 11. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE NETWORK SCANNER
  • 12. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE VULNERABILITY ASSESSMENT
  • 13. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE PEN TESTING ZED ATTACK PROXY
  • 14. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE BREACH AND ATTACK SIMULATION
  • 15. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE OPEN-SOURCE PHISHING FRAMEWORK
  • 16. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE REQUIREMENTS
  • 17. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE BUT... NO MONEY
  • 18. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE DO NOT FEAR … OPEN SOURCE IS HERE
  • 19. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE SECURITY ONION
  • 20. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE ELASTICSEARCH, LOGSTASH, KIBANA, SNORT, SURICATA, BRO, WAZUH, SGUIL, SQUERT, NETWORKMINER ALL INSIDE
  • 21. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE VERY HARD TO INSTALL ( NOT )
  • 22. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE GDPR DEPENDING ON THE CIRCUMSTANCES, AN EFFECTIVE AND APPROPRIATE ENCRYPTION SOLUTION CAN ALSO BE A MEANS OF DEMONSTRATING COMPLIANCE WITH THE SECURITY REQUIREMENTS OF THE GDPR
  • 23. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE ENCRYPTION SOLUTION
  • 24. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE GDPR - Privacy Impact Assessment The instrument for a privacy impact assessment (PIA) or data protection impact assessment (DPIA) was introduced with the General Data Protection Regulation (Art. 35 of the GDPR). This refers to the obligation of the controller to conduct an impact assessment and to document it before starting the intended data processing.
  • 25. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE GDPR - Privacy Impact Assessment
  • 26. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE GDPR - Privacy Impact Assessment
  • 27. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE GDPR - Privacy Impact Assessment
  • 28. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE GDPR - Privacy Impact Assessment
  • 29. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE Forensic tools THE SIFT WORKSTATION IS A GROUP OF FREE OPEN- SOURCE INCIDENT RESPONSE AND FORENSIC TOOLS DESIGNED TO PERFORM DETAILED DIGITAL FORENSIC EXAMINATIONS IN A VARIETY OF SETTINGS
  • 30. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE CONCLUSIONS YOU CAN USE OPENSOURCE TO PROTECT YOUR ORGANIZATION; THERE ARE OPENSOURCE SOLUTIONS FOR EVERY STAGES OF AN CYBERATTACK; YOU DON´T NEED TO SPEND A LOT OF MONEY; MY ENGLISH IS VERY BAD.
  • 31. CY3C29 – WHITE HAT HACKINGCYBERSECURITY WITH OPENSOURCE THANKYOU