Why there is a need to stop addressing security only in relation to information technology? Why are traditional approaches to business security untenable under current risk conditions? What areas of information security should be prioritized and what information security functions require development? We are late, let's think together how to not fall behind.
As you know, human is smaller and slower then almost everything on earth that could eat it. Therefore, during evolution, we had to come together and learn how to use tools to enhance our feeble limbs. This strategy proved to be surprisingly successful in the struggle for survival in the wild, but new threats of today require a new approach. Or not?
Internet of things has been an integral part of the 4th industrial revolution. It opens a lot of possibilities for enterprises however at the same time it deals with the security risks. Organisations should take that into account when developing their information security strategies. The quantity of operating devices has been increasing exponentially, so the comprehensive approach to information security will help to minimize the risks that internet of things may cause.
Security is one of the basic needs for every human being – as soon as it is compromised, it creates stress and puts the focus only on it until the threat is reduced. We are all trying to be careful so as to reduce our exposure to threats, but do we treat business the same way? The most important thing is to be aware of what could cause security threats, the consequences of such threats and how to handle security incidents. In my presentation today I will try to find answers to questions like what is business data, how should a company classify them, what policies and tools should be introduced to efficiently reduce threats to business.
The third world war has already begun. Information is the resource for struggle.
We are talking about the fact that cyber attacks have grown into a business available not only to professionals. Business that brings real money.
According to the experience of Ukraine clearly visible - a large extra cost of cyber attacks gives the political situation around. And the attack on the Ukrainian infrastructural facilities already becomes a habit, so the report also focused on the detection, analysis and neutralization of contemporary hidden targeted attacks in real time.
Paradox: Information Security market is growing amazingly fast and the are plenty of security products out there but so does number of reported breaches. Why does it happen and the incidents continue to appear? In my speech I will try to answer this question and also I will try to give you some guidance on how to increase speed of Incident Response or even to eliminate a chance of incident to happen by having continuous visibility over your infrastructure.
Who carries out targeted attacks?
Which are the most sensitive vulnerabilities in corporate infrastructure?
What kind of damages could be because of targeted attacks?
Who is to blame for the fact that your system has been compromised?
How to improve the protection against modern threats?
• Record chart of Ukrainian Cyber-crimes, or fast situation come-down today
• Problems of discovering and bringing to responsibility IT Moriarti
• Evidence – on what to focus efforts, or special aspects of evidence of guilt in Cyber-crimes committed by “hands with keyboards”
• Prophylaxis of Cyber-crimes, or why it’s cheaper to prevent, then to cure