420 likes | 511 Views
Gap in Information Security The GIS Paradox. Jay Bavisi President EC-Council. Partneri. Medijski pokrovitelji. FYI 285 MILLION RECORDS WERE COMPROMISED IN 2008. Image Courtsey:www.lloyds.com. Source: 2009 Data Breach Investigations Report by Verizon.
E N D
Gap in Information SecurityThe GIS Paradox Jay Bavisi President EC-Council
Partneri Medijski pokrovitelji
FYI 285 MILLION RECORDS WERE COMPROMISED IN 2008 Image Courtsey:www.lloyds.com Source: 2009 Data Breach Investigations Report by Verizon
Typical Enterprise Network Complex Indeed!
Revisiting 2008 Sophos Security threat report, 2008
Or so we thought. We are well-protected.
2009 Data Breach Investigation Report Source: 2009 Data Breach Investigations Report by Verizon
Breach Mechanism Source: http://www.ccc.de/biometrie/
Breach Mechanism Source: http://www.ccc.de/biometrie/
Breach Mechanism Encryption:Screenshot Capture?
Breach Mechanism Cracking Passwords
Firewalls Defense Mechanism
Preventing Insider Threat Ana Belen Montes, who had been a Senior Intelligence Analyst for Defense Intelligence Agency, was convicted of spying for Cuba on October 16, 2002 and sentenced to 25 years in prison.
Physical Security Defense Mechanism
Typical Organization : Security Technologies Used So Who Manages these Technologies?
Did you know? Humans are the weakest link of a security chain!
“D-SHIP” Approach towards Enterprise Security Secure your Data/Application /Network Hack Your Data/Application /Network 2 3 Security 1 DR and BCP 5 4 Investigate (Forensics) Prosecute (Legal)
Who is an Ethical Hacker? To Catch A Hacker, you have to think like one!