Cybersecurity Masterclass 2018

28th- 29th- 30th June 2018 | MUMBAI - INDIA

Course Description

Cybersecurity Masterclass 2018 Description

As information technology becomes ever more complex and Internet usage increasingly widespread, cybersecurity is becoming an increasingly important and business-critical field. Unfortunately, most organizations are not prepared to handle cybersecurity threats. In fact, 66% of IT and security professionals say that their firms are unprepared to recover from a cyber attack. A key example of this unpreparedness is the fact that many of the companies impacted by the WannaCry attack last year didn't install critical updates into their Windows infrastructure that had been released by Microsoft many months before.
 
Attempting to disrupt the landscape of technologies focused on Cybersecurity is Artificial Intelligence and, more specifically, Deep Learning. Taking the flexibility and thinking capacity of the human mind, digitizing it, and creating a genius system faster, more consistent and potentially more capable than any human brain, deep learning is now plowing through colossal mountains of data, often in real time, to uncover new and often
unexpected relationships, providing unique insights into threats, and empowering improvements to machine learning models and mitigation processes. One of the benefits of these technologies will be to enable analysts or threat responders to focus on the half-dozen critical events of the day (rather than distill 50,000 erroneous alerts generated each day).
 
Edgar Perez's Masterclass in Cybersecurity will bring CEOs, board members and top executives up to speed on the most recent technologies (such as artificial intelligence) and battle-tested approaches to protect their companies' valuable information and intellectual property from prying eyes of hackers and competitors, and leverage their cyber success in both cultivating stronger relationships with current and new clients and safeguarding the interests of all stakeholders, partners, and employees.
 

4 Recent Biggest Case Studies

CASE STUDY 1: THE “WANNACRY” RANSOMWARE ATTACK
Lack of cybersecurity discipline leading to crippling business downtime
Worldwide cyberattack by the WannaCry ransomware cryptoworm
It targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in Bitcoin
Within a day, it infected more than 230,000 computers in over 150 countries
Britain's National Health Service (NHS), Telefónica, FedEx and Deutsche Bahn were hit along with many other companies worldwide
A security patch had been released by Microsoft in March 2017; unfortunately, many organizations didn’t apply it until it was too late
The importance of using appropriate software and having the latest security patches installed
Insights gained from organizations that proactively leveraged cybersecurity to encourage customer satisfaction and maximize retention

CASE STUDY 2: HOME DEPOT’S CUSTOMER DATA HACK
From phishing attack to a vendor to a $179 million loss
September payment data systems breached (5 months’ worth of data)
56 million credit and debit cards, numbers, expiration dates and CCVs
53 million customer email addresses 
Hackers gained access to Home Depot’s network by phishing the login credentials of one of its vendors and exploiting unpatched Windows vulnerability
Installed malware on self-checkout registers
As of March 2017, cost of the breach is at least $179 million
Final total likely to be much higher because of legal fees and any other undisclosed payouts

CASE STUDY 3: 83 MILLION ACCOUNTS HACKED AT JPMORGAN CHASE
Vendor Compromise Leading to Largest Financial Services Breach
By July 2014, a Russian crime ring was able to amass 1.2 billion unique username and password combinations
JPMorgan Chase determined that some of these combinations allowed access to its Corporate Challenge website
Hackers had obtained the website certificate from the site’s vendor, Simmco Data Systems; this allowed them to pose as the race website operator and intercept traffic, such as race participants’ login credentials
A few weeks later, the bank learned that its systems had been breached as well. Hackers tested stolen usernames and passwords on an older system handling bank employee benefits. When those worked, they tested the credentials on other bank systems
Ultimately, JPMorgan Chase’s attackers compromised 90 servers storing contact information for current and former customers
The attack ultimately impacted 76 million households and 7 million small businesses

CASE STUDY 4: WHEN THE BEST TECHNOLOGY CAN’T REPLACE HUMAN JUDGEMENT
Little Holiday Cheer as 40 Million Credit Cards Numbers are Stolen
On December 12, 2013, the FBI alerted Target of a massive data breach
Three days later, the firm confirmed an attack and eradicated malware designed to steal credit card data used at the firm’s 1,797 stores surreptitiously installed in their POS system
Six months earlier, the firm had begun installing a $1.6 million malware detection tool made by FireEye.Specialists in Bangalore would monitor its computers around the clock and alert the firm’s IT team in Minneapolis
By mid-Novemberhowever, intruders had gained access to the system by using stolen credentials from a third-party vendor
On Saturday, November 30, two days after Thanksgiving, hackers were spotted by FireEye’s tool as they were ready to start data exfiltration. Bangalore got an alert and flagged the firm’s security team. They did nothing
Target stood by as 40 million credit card numbers flowed out of its computers
 
For registration contact us at 022-62210100 or email us raj@marcepinc.com




Training Agenda

3-Day Training Agenda for Cybersecurity Masterclass 2018

Mr. Perez Masterclass in Cybersecurity will provide insights on what organizations can do today to prevent cyberattack from compromising their information and reputation

DAY 1: UNDERSTAND THE LOOMING THREAT

            Cybersecurity Overview and Trends

             o   Understanding today’s cyber attacks

             o   How to get better at responding to cyber threats

             o   Combating today’s attacks with 21st-century tools

            Understanding the Cybersecurity Testing Method

             o   Anatomy of a cyber attack explained

             o   Cybersecurity testing as a component of a strong governance process

             o   Protection of firm networks and client information

             o   Detection of unauthorized activity and other security vulnerabilities

           The Basics of Security Architecture

           To Phish or Not To Phish

DAY 2: PREPARE AN EFFECTIVE RESPONSE

            Introduction to the Cybersecurity Framework

            o   Why a Cybersecurity Framework is urgently needed

            o   Using the Cybersecurity Framework to strengthen information security

            o   The Cybersecurity Framework from conceptualization to implementation

           The Cybersecurity Framework Components

            o   The core of cybersecurity activities and references common across critical sectors

            o   Aligning standards, guidelines, and practices with current vs. target profiles

            o   How the organization views cyber threats through the implementation tiers

           Establishing or Improving a Cybersecurity Program

DAY 3: DEPLOY AND MONITOR A SUCCESSFUL STRATEGY

          Introduction to Cyber Network Defense

         Social Engineering: How the “Weak Human Link” Can Become the Organization’s Greatest Strength

           o   Social Engineering and Cognitive Biases

           o   How Information Security is Affected by Behavior Economics

           o   Today’s Systems Development Environment

         The Four Components of the Cyber Preparedness Continuum:

           o   Coordination

           o   Information sharing

           o   Planning and readiness

           o   Continuous Improvement

For registration contact us at 022-62210100 or email us raj@marcepinc.com

Course Director

Mr. Edgar Perez is a published author, business consultant for billion-dollar private equity and hedge funds, and Council Member at the Gerson Lehrman Group. He has subject matter expertise in Artificial Intelligence and Deep Learning, Cybersecurity and financial regulation (Dodd-Frank Act). He is author of The AI Breakthrough, How Artificial Intelligence is Advancing Deep Learning and Revolutionizing Your World (2018), Knightmare on Wall Street, The Rise and Fall of Knight Capital and the Biggest Risk for Financial Markets (2013), and The Speed Traders, An Insider’s Look at the New High-Frequency Trading Phenomenon That is Transforming the Investing World, published in English by McGraw-Hill Inc. (2011), ????, published in Mandarin by China Financial Publishing House (2012), and Investasi Super Kilat, published in Bahasa Indonesia by Kompas Gramedia (2012).
Share this Post: