You are on page 1of 16

Detecting and Defending against Cyber Threats

Attention Attendees:
Remember to type your messages to all panellists and attendees
Short Course Recap & The Future
Common Threats
Current Common Threats
• Business E-mail Compromise (BEC)
• Ransomware
• Wire Fraud
Defend
Defence Strategies
• Governance
• Technical Controls
• Audit & Compliance
• Active and Passive Defence
Detect
Detection Strategies
• Detective Controls
• Logging & SIEM
• Threat Hunting
The Future
Threats
• Corporate black mail
• Increased offensive attacks
• Increased supply chain attacks
• Increased threats to critical infrastructure
• Increased threats to IoT
• Increased threats to, and use of IoT and other embedded devices for
carrying out attacks
Future Defence
• Automation
• Continuous evolution of machine learning
• Artificial Intelligence
• Cryptography applications
• Quantum computing
• Increased regulation and compliance
Future Detection
• Active defence
• Threat hunting
• Threat intelligence
• OSINT
• Google
• Maltego
• Shodan
• Dark Web
Demo
Final Exam
Questions?

You might also like