Professional Documents
Culture Documents
Your
o u r D a ta a nd Phon N et w
Y e – o rk s
s e nc e O n line Ho me :
Pre
T he C l ou d ’” - Sc
AKA: ‘ Work h oo l
INTERNET OF THINGS
IoT
Visibility
ANALYTICS
Who is the Adversary?
The Who is he?
Adversary He could be sitting right next to you….
He could be your Facebook Friend…..
He could be…. Bob!
Attacker Target
Weaponization
and Delivery
BBC REPORT: Hackers h
ave gained ;
access to the personal d a ck s In s ta g ra m
ata of
10-Ye ar- O l d H
celebrities on Instagram
by using a o m F a c eb o o k
"flaw" in its security sys
tems. Wins $10K Fr
Attacker Target
Weaponization
and Delivery
2017 - mor
e than 1.5
incidents o million new
ra bility f mobile m
ew B lue to o th v u lne been detec alware hav
September 2017: N co n ds!
ted by McA
fee Labs in
e
ck a ph on e in 10 s e the first qu
can ha arter of th
for a total e year alon
of more th e–
mobile ma a n 16 millio
lware incid n
ents.
Spear Phishing + Decoy
Attacker Target
Exploit Document
Backdoor Access
Decoy Document
Backdoor Trojan
How do you win?
Bob You
Don’t be Force attackers Use Basic
low hanging to use their "Cyber
best tools. Hygiene"
Fruit
Who can
Know the benefit from
How would you
attack your own
attacker compromising
you?
network?
Critical Need for Cybersecurity Training
MANY MANY JOBS AND GREAT PAY!!