Você está pronto para enfrentar os criminosos cibernéticos? Fernando Romero, CISSP Cybersecurity Specialist LATAM [email protected]
Você está pronto para enfrentar os criminosos cibernéticos?
Fernando Romero, CISSPCybersecurity Specialist [email protected]
2
aiming to divert custom.
Hacktivists
seeking to avenge a perceived wrong.
those who use hacking to get their message across.
those aiming to exploit for financial gain.
amateurs vandalising ‘just because’.
Employees Competitors EntrepreneurHackers
Como podemos categorizar os criminosos cibernéticos?
3
1. Security challenges.
Digital crime is driven by a criminal dark market – with organised, well resourced and profitable attacks.
Beyond the ‘four walls’, remote working, BYOD and complex supply chains increase vulnerability – leaving security teams struggling to keep up with digital thieves.
The net cast by criminal entrepreneurs is widening. Every second new malware is created and distributed and new phishing campaigns are launched.
Unpatched, legacy IT can be a weak point in digital defences.
Phishing tactics are constantly evolving and new trends emerge towards email ‘CEO fraud’.
Attacks go beyond distributing malware – organised crime groups exploit, blackmail employees and place people onthe inside.
44
2. Rethink the digital security threat.
55
3. Ruthless and rational entrepreneurs.
66
4. Taking the fight to the attacker.
77
4. Taking the fight to the attacker.
Keep criminals away from your information. Your first line of defence is to keep criminals
out of your information systems. Criminal
entrepreneurs are after your data, and without access to
this, they can’t make any money.
Make it harder for attackers to exploit your data. Should you suffer a breach, the next step is to make it harder for
criminals to actually use your data. Encryption is a key
element in achieving this — and banks offer a good
example to follow.
Stop criminals spending their ill-gotten gains. To truly cut off criminal entrepreneurs’ ability to capitalise on their crimes, you have to stop them using
their profits. This means being part of a collaborative
worldwide effort to prevent money laundering and access
to black markets. ’.
88
5. Um pouco do Portfolio da BT Security.
BT Assure DDoS Mitigation makes sure hackers cannot
prevent customers from reaching your ‘storefront’.
BT Assure Threat Defence guarantees real-
time response to any critical alerts or targeted malware detected within
your network.
BT Assure Threat Monitoring provides a unique security
information and event management (SIEM) service
that collects and analyses security information 24x7 across your organisation.
9
The Geo-mapping shows the source and destination of attacks in real time or based on historical data
The search function allows you to quickly find information within messages
Failures
Anomalies
PotentialThreats
Attack
6. Assure analytics - Map View
10
7. Assure DDoS Mitigation – The problem
11
8. Assure DDoS Mitigation – A global solution
BT Assure. Security that matters 12
BT SOC• Monitoring• Query• Analysis• Alerts
Customer portal & Intelligence Feeds
User environment
User Web browsing Email servers
Check Point SandBlast
Internet
9. Assure Threat Defence – Check Point Technology + BT Services
REAL TIME
13
10. Why BT.