SlideShare uma empresa Scribd logo
1 de 10
Whats up for today? 
Some chitchat about your baby…
The dark side of the internet 
• Phishing 
• Social engineering 
• Hacking (vulnerabilities & misconfigurations) 
• Injection (iFRAME) 
• DDOS 
• DNS hijacking 
• Cookie hijacking/stealing 
• MITM (Man In The Middle) 
• Xss and SQL injection 
• 3rd Parties
Serious cases 
• 13 October 2014 1 million dutch e-mail 
accounts compromised. 
• 5600 Dutch websites hacked (SQL injection) 
• Target hack, costs 40 million $, Home depot 
60 Miljon $ ( total costs in revenue and 
security measures) 
• In two years 2 Billion account credentials 
breached ( including CC and person 
credentials)
Data Breaches Leads to Drop in Sales 
• Target Earnings Slide 46% After Data Breach 
• One third of consumers will shop elsewhere if 
their retailer of choice is breached, according 
to new research 
• Downtime and massive costs after data 
breach or malware infection.
What can/must we do? 
• Audit/Pentest 
• Source code check 
• Scanning pro software * 
• WAF * (Web Application Firewall) 
• Encrypt your database, encrypt credentials, if hacked it wont be worth decrypting due to time 
• Dedicated Hosting 
• HTTPS, Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security) 
• MASKING * 
• Malware Analyses, day round * 
• DDOS protection * 
• Secure DNS * (ask hosting company) 
• Blacklisting checks * 
• Monitor your security 
• Security is a must, create budget! (its not IF, but WHEN you will get hacked) 
• Backupfallbackupfallback crisis scenario’s and documentation 
• Backoffice security, don’t let your twelve year old kid download movies on your work laptop 
• Educate the thing between chair and keyboard! Know your software platform(s) (sorry if its you) 
• Communicate with your customer about your cyber initiatives, but be very clear in how! 
* Do it yourself, approx. 400 euro a year.
What can/must we do? 
• Audit/Pentest 
• Source code check 
• Scanning pro software * 
• WAF * (Web Application Firewall) 
• Encrypt your database, encrypt credentials, if hacked it wont be worth decrypting due to time 
• Dedicated Hosting 
• HTTPS, Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security) 
• MASKING * 
• Malware Analyses, day round * 
• DDOS protection * 
• Secure DNS * (ask hosting company) 
• Blacklisting checks * 
• Monitor your security 
• Security is a must, create budget! (its not IF, but WHEN you will get hacked) 
• Backupfallbackupfallback crisis scenario’s and documentation 
• Backoffice security, don’t let your twelve year old kid download movies on your work laptop 
• Educate the thing between chair and keyboard! Know your software platform(s) (sorry if its you) 
• Communicate with your customer about your cyber initiatives, but be very clear in how! 
* Do it yourself, approx. 400 euro a year.
Treat (not thread) your baby like a baby 
Create the safe environment you want your baby to growup in. 
For you, your family, your customer and your future. 
Happy Selling!
CONTACT 
Remo Hardeman 
Omerta Information Security 
remo@omerta.nl 
Visits 
Boompjes 57 
7e verdieping 
3011 XB Rotterdam 
SOCIAL MEDIA 
facebook.com/ 
omertanetherlands 
TWITTER 
https://twitter.com/ 
@omerta_infosec
CONTACT 
Remo Hardeman 
Omerta Information Security 
remo@omerta.nl 
Visits 
Boompjes 57 
7e verdieping 
3011 XB Rotterdam 
SOCIAL MEDIA 
facebook.com/ 
omertanetherlands 
TWITTER 
https://twitter.com/ 
@omerta_infosec

Mais conteúdo relacionado

Mais procurados

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
Vong Borey
 

Mais procurados (18)

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Security horrors
Security horrorsSecurity horrors
Security horrors
 
Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
 
The deep web
The deep webThe deep web
The deep web
 
Darknet
DarknetDarknet
Darknet
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on security
 
Dark web
Dark webDark web
Dark web
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
Making Secure Choices
Making Secure ChoicesMaking Secure Choices
Making Secure Choices
 

Destaque

2010 08 15 abc de paraguay
2010 08 15 abc de paraguay2010 08 15 abc de paraguay
2010 08 15 abc de paraguay
Joseluis Zawate
 
Hadis, sunah, khobar, atsar
Hadis, sunah, khobar, atsarHadis, sunah, khobar, atsar
Hadis, sunah, khobar, atsar
Mar'ah Salamah
 
Prueva slidesher
Prueva slidesherPrueva slidesher
Prueva slidesher
dalebabo25
 
Revista consultora
Revista consultoraRevista consultora
Revista consultora
IVANI Liss
 
Atividades de casa copy
Atividades de casa copyAtividades de casa copy
Atividades de casa copy
Maria Terra
 
Flag ashley w
Flag ashley wFlag ashley w
Flag ashley w
mrburt
 
Organigrama estuctural
Organigrama estucturalOrganigrama estuctural
Organigrama estuctural
Emprendimient
 
Dia mundial da saúde rpc tv 17.04
Dia mundial da saúde   rpc tv 17.04Dia mundial da saúde   rpc tv 17.04
Dia mundial da saúde rpc tv 17.04
Meio & Mensagem
 

Destaque (20)

2010 08 15 abc de paraguay
2010 08 15 abc de paraguay2010 08 15 abc de paraguay
2010 08 15 abc de paraguay
 
Rakamlarla Türkiye: Orman ve Su İşleri
Rakamlarla Türkiye: Orman ve Su İşleriRakamlarla Türkiye: Orman ve Su İşleri
Rakamlarla Türkiye: Orman ve Su İşleri
 
Hadis, sunah, khobar, atsar
Hadis, sunah, khobar, atsarHadis, sunah, khobar, atsar
Hadis, sunah, khobar, atsar
 
Bygga om dialogen, nya finansieringsformer och fyra kluster
Bygga om dialogen, nya finansieringsformer och fyra klusterBygga om dialogen, nya finansieringsformer och fyra kluster
Bygga om dialogen, nya finansieringsformer och fyra kluster
 
E-maDe gemiste kans van e mailmarketing
E-maDe gemiste kans van e mailmarketingE-maDe gemiste kans van e mailmarketing
E-maDe gemiste kans van e mailmarketing
 
Mi príncipe azul
Mi príncipe azulMi príncipe azul
Mi príncipe azul
 
Rok 2015 w liczbach
Rok 2015 w liczbachRok 2015 w liczbach
Rok 2015 w liczbach
 
Ativ1 4tecnologianaescola fatimaealessandra
Ativ1 4tecnologianaescola fatimaealessandraAtiv1 4tecnologianaescola fatimaealessandra
Ativ1 4tecnologianaescola fatimaealessandra
 
Modelos atomicos
Modelos atomicosModelos atomicos
Modelos atomicos
 
Sons da Nova
Sons da NovaSons da Nova
Sons da Nova
 
Campaña solidaria
Campaña solidariaCampaña solidaria
Campaña solidaria
 
Prueva slidesher
Prueva slidesherPrueva slidesher
Prueva slidesher
 
Revista consultora
Revista consultoraRevista consultora
Revista consultora
 
Atividades de casa copy
Atividades de casa copyAtividades de casa copy
Atividades de casa copy
 
Flag ashley w
Flag ashley wFlag ashley w
Flag ashley w
 
Organigrama estuctural
Organigrama estucturalOrganigrama estuctural
Organigrama estuctural
 
Dia mundial da saúde rpc tv 17.04
Dia mundial da saúde   rpc tv 17.04Dia mundial da saúde   rpc tv 17.04
Dia mundial da saúde rpc tv 17.04
 
James serna 123
James serna 123James serna 123
James serna 123
 
I. E. SANTA ANA
I. E. SANTA ANAI. E. SANTA ANA
I. E. SANTA ANA
 
Prêmios internacionais
Prêmios internacionaisPrêmios internacionais
Prêmios internacionais
 

Semelhante a Remo presentatie v1

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 

Semelhante a Remo presentatie v1 (20)

Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Cyber threat trends
Cyber threat trendsCyber threat trends
Cyber threat trends
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work NetworkPrivate Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 

Mais de Onno Hansen-Staszyński

Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Onno Hansen-Staszyński
 

Mais de Onno Hansen-Staszyński (20)

De lege horizon.pdf
De lege horizon.pdfDe lege horizon.pdf
De lege horizon.pdf
 
Marxisme en Oost-Europa.pdf
Marxisme en Oost-Europa.pdfMarxisme en Oost-Europa.pdf
Marxisme en Oost-Europa.pdf
 
CASE STUDY - MIL in wartime.pdf
CASE STUDY - MIL in wartime.pdfCASE STUDY - MIL in wartime.pdf
CASE STUDY - MIL in wartime.pdf
 
My point of view
My point of viewMy point of view
My point of view
 
How big food can nudge youngsters
How big food can nudge youngstersHow big food can nudge youngsters
How big food can nudge youngsters
 
A Minimum Viable Product definition for a socially relevant educational tech...
A Minimum Viable Product definition for a socially relevant educational  tech...A Minimum Viable Product definition for a socially relevant educational  tech...
A Minimum Viable Product definition for a socially relevant educational tech...
 
ANEMELO newsletter 3
ANEMELO newsletter 3ANEMELO newsletter 3
ANEMELO newsletter 3
 
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
Jak pracowac profilaktycznie z dzieckiem w wieku 13-15 lat (wydanie nr 2)
 
Anemelo handbook background information v2
Anemelo handbook background information v2Anemelo handbook background information v2
Anemelo handbook background information v2
 
Dear parent
Dear parentDear parent
Dear parent
 
Certificates
CertificatesCertificates
Certificates
 
Pu dialog - jak zaczynać
Pu dialog - jak zaczynaćPu dialog - jak zaczynać
Pu dialog - jak zaczynać
 
Second training session 2018 athens programme
Second training session 2018 athens programmeSecond training session 2018 athens programme
Second training session 2018 athens programme
 
Pilot questionnaire sup v2.1
Pilot questionnaire sup v2.1Pilot questionnaire sup v2.1
Pilot questionnaire sup v2.1
 
Pilot questionnaire fac v2.1
Pilot questionnaire fac v2.1Pilot questionnaire fac v2.1
Pilot questionnaire fac v2.1
 
Chat protocol nl dee v3.1
Chat protocol nl dee v3.1Chat protocol nl dee v3.1
Chat protocol nl dee v3.1
 
Pilot questionnaire par v2.1
Pilot questionnaire par v2.1Pilot questionnaire par v2.1
Pilot questionnaire par v2.1
 
Actieplan fac v4.1
Actieplan fac v4.1Actieplan fac v4.1
Actieplan fac v4.1
 
Actieplan sup v4.1
Actieplan sup v4.1Actieplan sup v4.1
Actieplan sup v4.1
 
Newsletter 2
Newsletter 2Newsletter 2
Newsletter 2
 

Último

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 

Último (20)

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 

Remo presentatie v1

  • 1.
  • 2. Whats up for today? Some chitchat about your baby…
  • 3. The dark side of the internet • Phishing • Social engineering • Hacking (vulnerabilities & misconfigurations) • Injection (iFRAME) • DDOS • DNS hijacking • Cookie hijacking/stealing • MITM (Man In The Middle) • Xss and SQL injection • 3rd Parties
  • 4. Serious cases • 13 October 2014 1 million dutch e-mail accounts compromised. • 5600 Dutch websites hacked (SQL injection) • Target hack, costs 40 million $, Home depot 60 Miljon $ ( total costs in revenue and security measures) • In two years 2 Billion account credentials breached ( including CC and person credentials)
  • 5. Data Breaches Leads to Drop in Sales • Target Earnings Slide 46% After Data Breach • One third of consumers will shop elsewhere if their retailer of choice is breached, according to new research • Downtime and massive costs after data breach or malware infection.
  • 6. What can/must we do? • Audit/Pentest • Source code check • Scanning pro software * • WAF * (Web Application Firewall) • Encrypt your database, encrypt credentials, if hacked it wont be worth decrypting due to time • Dedicated Hosting • HTTPS, Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security) • MASKING * • Malware Analyses, day round * • DDOS protection * • Secure DNS * (ask hosting company) • Blacklisting checks * • Monitor your security • Security is a must, create budget! (its not IF, but WHEN you will get hacked) • Backupfallbackupfallback crisis scenario’s and documentation • Backoffice security, don’t let your twelve year old kid download movies on your work laptop • Educate the thing between chair and keyboard! Know your software platform(s) (sorry if its you) • Communicate with your customer about your cyber initiatives, but be very clear in how! * Do it yourself, approx. 400 euro a year.
  • 7. What can/must we do? • Audit/Pentest • Source code check • Scanning pro software * • WAF * (Web Application Firewall) • Encrypt your database, encrypt credentials, if hacked it wont be worth decrypting due to time • Dedicated Hosting • HTTPS, Perfect Forward Secrecy, HSTS (HTTP Strict Transport Security) • MASKING * • Malware Analyses, day round * • DDOS protection * • Secure DNS * (ask hosting company) • Blacklisting checks * • Monitor your security • Security is a must, create budget! (its not IF, but WHEN you will get hacked) • Backupfallbackupfallback crisis scenario’s and documentation • Backoffice security, don’t let your twelve year old kid download movies on your work laptop • Educate the thing between chair and keyboard! Know your software platform(s) (sorry if its you) • Communicate with your customer about your cyber initiatives, but be very clear in how! * Do it yourself, approx. 400 euro a year.
  • 8. Treat (not thread) your baby like a baby Create the safe environment you want your baby to growup in. For you, your family, your customer and your future. Happy Selling!
  • 9. CONTACT Remo Hardeman Omerta Information Security remo@omerta.nl Visits Boompjes 57 7e verdieping 3011 XB Rotterdam SOCIAL MEDIA facebook.com/ omertanetherlands TWITTER https://twitter.com/ @omerta_infosec
  • 10. CONTACT Remo Hardeman Omerta Information Security remo@omerta.nl Visits Boompjes 57 7e verdieping 3011 XB Rotterdam SOCIAL MEDIA facebook.com/ omertanetherlands TWITTER https://twitter.com/ @omerta_infosec