the cybersecurity kill chan - myth or threat
TRANSCRIPT
Today’s Menu
Few words on backgroundAnd of course… a disclaimer!
Moving from IT Security to CybersecurityIs it just a “wording” change?
The Cybersecurity Kill ChainWhat’s this?
So… Threat or Myth?Obvious answer?
If threats there are…what are the scariest ones? Trends / Tendencies?!?!... Not really!
To counter-attack you have to think like…You already know the answer! Or maybe…
I express my own opinion as a Cybersecurity expert!
&My legal department did not review my slides!
&Yes, I know “a bit” about Cybersecurity!
butI learn everyday so please… give me inputs!
Exploitation“Hacking”
Post exploitation & maintaining access
Reconnaissance ScanningCovering
tracks
Cyber kill chain
Exploitation“Hacking”
Post exploitation & maintaining access
Reconnaissance ScanningCovering
tracks
Cyber kill chain
Evaluate TreatIdentify AnalyzeMonitor and
communicate
IT & Information Risks chain
“About 110 million Americans — equivalent to about 50% of U.S. adults — have had their personal data exposed in some form in the past year”
Tim Pawlenty, president of the Financial Services Roundtable and the former governor of Minnesota.