SlideShare a Scribd company logo
A6 a pragmatic Journey
into Cyber Security
Jorge Sebastiao, CISSP
ICT Expert
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge
Disclaimer & Copyright
• Please note that this presentation is for informational, knowledge sharing and educational purposes only. Any
comments or statements made herein do not necessarily reflect the views of Huawei. The information is intended
for the recipient's use only and should not be cited, reproduced or distributed to any third party without the prior
consent of the authors. Although great care is taken to ensure accuracy of information neither the author, nor
Huawei can be held responsible for any decision made on the basis of the information cited.
• The content of this presentation is based on information gathered in good faith from both primary and
secondary sources and is believed to be correct at the time of publication. The author can however provide no
guarantee regarding the accuracy of this content and therefore accepts no liability whatsoever for any actions
taken that subsequently prove incorrect.
• The practices listed in the document are provided as is and as guidance and the author and Huawei do not claim
that these comprise the only practices to be followed. The readers are urged to make informed decisions in their
usage.
• The information presented in this presentation is not intended to be, and should not be construed as, an offer to
sell any products or services or a solicitation of an offer to buy any products or services . Any such offer or sale will
be made pursuant to, and the information presented at this meeting is qualified in its entirety by, authorized
offering documents and related disclosure schedules or similar disclosure documentation.
• All logos and brand names belong to their respective owners and we do not claim any relationship or association,
implied or otherwise, with them.
• Use of any materials by virtue of relationships and associations, if any, are mentioned explicitly.
• Author has taken care to attribute all sources for external materials used in this presentation, and any oversight is
regretted. If you, as owner, or as viewer, find any reason to dispute the use of these materials kindly communicate
the same to author.
• Any omissions, in terms of attribution, may be due to an error of author and not intentional.
Google review of email Phishing
Spear Phishing
Is That an Office Phone In Your Pocket?
The future is here
Uncontrolled Connectivity
Everything is connected…
Apple Pay Exploit
M2M and Google Voice?
Smart Meters and Nest Hack
Healthcare Sensors Exploits
Physical Security
Hacking IIoT SCADA sensors
Industrial Scale Risks
Challenges
Disengagement
from the changing
customer mindset
Lack of
confidence in
return on
investment
Lack of regulatory
certainty on new
market structures
Privacy,
security and
resilience
Poorly
formulated M&A
and strategic
partnerships
Failure to define
new business
metrics
Failure to
capitalize on new
types of
connectivity
Insufficient information to
turn demand into value
Failure to shift
the business model
from minutes
to bytes
Lack of
organizational
flexibility
Mobile Malware up
148,778 samples 2013
5th Challenge -Protection against
State Sponsored Attacks
• # 19M89. %6/><345%
• I </>%' X71>%><. %v' ; >0%7?%# /4@q%
Is there an elephant in the
room?
0 Day Exploits - Guaranteed
Rogue & Clueless Users
Our security enemy is?
Security Nightmare
Cyberspace
CharacteristicsAsymmetric
Attribution
Problems
No Borders
Complex Interconnected
Systems
Outdated Assumptions?
Effective Countermeasures
Wrong Skills?
What is next?
Think outside the box
2
Effective Security is hidden
deep underneath…
Technology
ProcessPeople
Right Risk Appetite?
Modeling Risk and Threats
Threats Vulnerabilities
Controls Risks Assets
Security
Requirements
Business
Impact
exploit
exposeincreaseincrease
increase have
protect against
met by indicate
reduce
CONSEQUENCE
LIKLIEHOOD
FV
T
Risk Group
1
Risk Group
2
Risk Group
3
HighLow
L
o
w
H
i
g
h
RESPONSE
PROTECTION
Target Risk
Risk Reduction Strategies!
4As A4 of Security
Assess Evaluate, Audit, Check
Architect Plan, Design
Apply Build, Implement, Do
Administer Operate, Act
5As A5 of Security
Assess Evaluate, Audit, Check
Architect Plan, Design
Apply Build, Implement, Do
Administer Operate, Act
Awareness Intelligence, User
6As A6 of Security
Assess Evaluate, Audit, Check
Architect Plan, Design
Apply Build, Implement, Do
Administer Operate, Act
Awareness Intelligence, User
Agility Timeliness of Response
A6 - Process
Business Risk
Controls
Maturity
Defense in depth
The « defence in depth »
TBS- Time Based Security
Protection
DetectionResponse
SECURITY
P>D+R
Anti-virus
VPN
Firewall, IPS
Access Control
Grid Time Response
Patch Mgmt
Incidence Response
Disaster Recovery
Vulnerability Testing
SIEM
Log Correlation
CCTV, Access Control
Proper Security Metrics
Cyber Attack Recovery Agility
Risk
Active
Business
Can you
successfully
recover?
Road to Security Metrics
Security Metrics
KPIs, Testing Results
CSA Controls, Compliance, Operational, Financial
CoBIT
SOX
ISMS
ISO27001
PCI
HIPAA
Time Based Security
ISMS
ISO22301
ISMS
ISO20000
Final Goal Is
Total Integrated Security
Information
Security
Management
IoT, Device
Security
Management
Winning the War
Red Teaming Solve Attribution
Continuous Vulnerability Mgmt Crowd Sourcing/Bug Bounty
Fusing Crisis Management
Vertical CERT Integration Encryption
Exchange Knowledge Data Leak Prevention
Threat Management Reputation Management
Big Data Honeynets
Machine Learning Sandbox
Security Metrics Empower end users
Continuous Training Attack / Take down
10As A10 of Security
Assess Evaluate, Audit, Check
Architect Plan, Design
Apply Build, Implement, Do
Administer Operate, Act, Respond
Awareness Intelligence, User
Agility Timeliness of Response
Appetite How much Risk can you take?
Alignment Business focus
Assumption Something is wrong?
Authorization Right to access, authentication
Don’t bring a knife to gun fight
“…Security is
a continuous
skilled
process…”…
Jorge Sebastiao
http://linkedin.com/in/sebastiao
Questions
Jorge Sebastiao, CISSP
ICT Expert
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge

More Related Content

PPTX
Cybersecurity Fundamentals for Legal Professionals
PPTX
CYMASS Security Awareness Version 1.2
PPTX
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
PPTX
Crowd-Sourced Threat Intelligence
PDF
MITRE ATT&CKcon 2.0: From Susceptible to ATT&CK - A Threat Hunting Story; Chr...
PDF
MITRE ATT&CKcon 2.0: Keynote Address - The Friends We Made Along the Way; Ton...
PPTX
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
PDF
Building a Threat Hunting Practice in the Cloud
Cybersecurity Fundamentals for Legal Professionals
CYMASS Security Awareness Version 1.2
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Crowd-Sourced Threat Intelligence
MITRE ATT&CKcon 2.0: From Susceptible to ATT&CK - A Threat Hunting Story; Chr...
MITRE ATT&CKcon 2.0: Keynote Address - The Friends We Made Along the Way; Ton...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
Building a Threat Hunting Practice in the Cloud

What's hot (20)

PPTX
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
PPTX
Why Depending On Malware Prevention Alone Is No Longer An Option
PDF
E-FILE_Proofpoint_Uberflip_120915_optimized
PDF
MITRE ATTACKcon Power Hour - January
PDF
WhyNormShield
PDF
(SACON) Shomiron das gupta - threat hunting use cases
PDF
Slides to the online event "Creating an effective cybersecurity strategy" by ...
PDF
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PPT
Ethical hacking
PDF
A Journey Into Pen-tester land: Myths or Facts!
PDF
See Clearly and Respond Quickly from the Network to the Endpoint
PDF
[Webinar] The Art & Value of Bug Bounty Programs
PDF
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
PPTX
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
PPTX
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
PDF
Opsec for security researchers
PDF
Mobile Application Security Threats through the Eyes of the Attacker
PDF
Nexus It Group Resume Writing
PPT
Top 5 website security myths
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Why Depending On Malware Prevention Alone Is No Longer An Option
E-FILE_Proofpoint_Uberflip_120915_optimized
MITRE ATTACKcon Power Hour - January
WhyNormShield
(SACON) Shomiron das gupta - threat hunting use cases
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Ethical hacking
A Journey Into Pen-tester land: Myths or Facts!
See Clearly and Respond Quickly from the Network to the Endpoint
[Webinar] The Art & Value of Bug Bounty Programs
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Opsec for security researchers
Mobile Application Security Threats through the Eyes of the Attacker
Nexus It Group Resume Writing
Top 5 website security myths
Ad

Similar to A6 pragmatic journey into cyber security (20)

PDF
Wfh security risks - Ed Adams, President, Security Innovation
PPTX
Practical analytics hands-on to cloud & IoT cyber threats
PPTX
Security is broken V3.0
PPTX
NZISF Talk: Six essential security services
PDF
Fall2015SecurityShow
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPTX
Top Cybersecurity Challenges Facing Your Business
PDF
Tech Talent Meetup Hacking Security Event Recap
PDF
Cyber Security in a Fully Mobile World
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PPTX
How to-become-secure-and-stay-secure
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
PPTX
Emerging Trends in Cybersecurity by Amar Prusty
PDF
Cybersecurity Fundamentals for Bar Associations
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PDF
Application Security - Your Success Depends on it
PDF
Treating Security Like a Product
Wfh security risks - Ed Adams, President, Security Innovation
Practical analytics hands-on to cloud & IoT cyber threats
Security is broken V3.0
NZISF Talk: Six essential security services
Fall2015SecurityShow
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Top Cybersecurity Challenges Facing Your Business
Tech Talent Meetup Hacking Security Event Recap
Cyber Security in a Fully Mobile World
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
How to-become-secure-and-stay-secure
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs
Emerging Trends in Cybersecurity by Amar Prusty
Cybersecurity Fundamentals for Bar Associations
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
Application Security - Your Success Depends on it
Treating Security Like a Product
Ad

More from Jorge Sebastiao (20)

PPTX
Real estate tokenization and blockchain
PPTX
Blockchain and covid19 v3
PPTX
Top tech shapping startups
PPTX
Blockchain and security v3
PPTX
The road to blockchain 5.0
PPTX
Cyber Warfare 4TH edition
PPTX
How AI is Disrupting Traffic Management in Smart City
PPTX
Ai and traffic management application v1.0
PPTX
Dz hackevent 2019 Middle East Cyberwars V3
PPTX
AI HR and Future Jobs Version 2.1
PPTX
Cyber fear obstacles to info sharing-Version 2
PPTX
Blockchain & cyber security Algeria Version 1.1
PPTX
Datamatix GCC HR future jobs Version 1.3
PPTX
Cyber security crypto blockchain Version 3.2
PPTX
RTA AI for traffic management version 1.4
PPTX
IGF2017 Data is new oil - UN Internet Governance Forum
PPTX
ADIPEC physical and Infosec for Oil and Gas
PPTX
AVSEC are you flying cybersafe?
PPTX
Are we ready for IoT? VU Version 7
PPT
Togaf Version 9.1 Introduction Overview
Real estate tokenization and blockchain
Blockchain and covid19 v3
Top tech shapping startups
Blockchain and security v3
The road to blockchain 5.0
Cyber Warfare 4TH edition
How AI is Disrupting Traffic Management in Smart City
Ai and traffic management application v1.0
Dz hackevent 2019 Middle East Cyberwars V3
AI HR and Future Jobs Version 2.1
Cyber fear obstacles to info sharing-Version 2
Blockchain & cyber security Algeria Version 1.1
Datamatix GCC HR future jobs Version 1.3
Cyber security crypto blockchain Version 3.2
RTA AI for traffic management version 1.4
IGF2017 Data is new oil - UN Internet Governance Forum
ADIPEC physical and Infosec for Oil and Gas
AVSEC are you flying cybersafe?
Are we ready for IoT? VU Version 7
Togaf Version 9.1 Introduction Overview

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Basic Mud Logging Guide for educational purpose
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Institutional Correction lecture only . . .
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Computing-Curriculum for Schools in Ghana
01-Introduction-to-Information-Management.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
TR - Agricultural Crops Production NC III.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Supply Chain Operations Speaking Notes -ICLT Program
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Microbial disease of the cardiovascular and lymphatic systems
Basic Mud Logging Guide for educational purpose
Insiders guide to clinical Medicine.pdf
Cell Structure & Organelles in detailed.
Institutional Correction lecture only . . .
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Computing-Curriculum for Schools in Ghana

A6 pragmatic journey into cyber security

  • 1. A6 a pragmatic Journey into Cyber Security Jorge Sebastiao, CISSP ICT Expert Huawei http://linkedin.com/in/sebastiao/ Twitter: @4jorge
  • 2. Disclaimer & Copyright • Please note that this presentation is for informational, knowledge sharing and educational purposes only. Any comments or statements made herein do not necessarily reflect the views of Huawei. The information is intended for the recipient's use only and should not be cited, reproduced or distributed to any third party without the prior consent of the authors. Although great care is taken to ensure accuracy of information neither the author, nor Huawei can be held responsible for any decision made on the basis of the information cited. • The content of this presentation is based on information gathered in good faith from both primary and secondary sources and is believed to be correct at the time of publication. The author can however provide no guarantee regarding the accuracy of this content and therefore accepts no liability whatsoever for any actions taken that subsequently prove incorrect. • The practices listed in the document are provided as is and as guidance and the author and Huawei do not claim that these comprise the only practices to be followed. The readers are urged to make informed decisions in their usage. • The information presented in this presentation is not intended to be, and should not be construed as, an offer to sell any products or services or a solicitation of an offer to buy any products or services . Any such offer or sale will be made pursuant to, and the information presented at this meeting is qualified in its entirety by, authorized offering documents and related disclosure schedules or similar disclosure documentation. • All logos and brand names belong to their respective owners and we do not claim any relationship or association, implied or otherwise, with them. • Use of any materials by virtue of relationships and associations, if any, are mentioned explicitly. • Author has taken care to attribute all sources for external materials used in this presentation, and any oversight is regretted. If you, as owner, or as viewer, find any reason to dispute the use of these materials kindly communicate the same to author. • Any omissions, in terms of attribution, may be due to an error of author and not intentional.
  • 3. Google review of email Phishing
  • 5. Is That an Office Phone In Your Pocket?
  • 10. M2M and Google Voice?
  • 11. Smart Meters and Nest Hack
  • 14. Hacking IIoT SCADA sensors Industrial Scale Risks
  • 15. Challenges Disengagement from the changing customer mindset Lack of confidence in return on investment Lack of regulatory certainty on new market structures Privacy, security and resilience Poorly formulated M&A and strategic partnerships Failure to define new business metrics Failure to capitalize on new types of connectivity Insufficient information to turn demand into value Failure to shift the business model from minutes to bytes Lack of organizational flexibility
  • 17. 5th Challenge -Protection against State Sponsored Attacks • # 19M89. %6/><345% • I </>%' X71>%><. %v' ; >0%7?%# /4@q%
  • 18. Is there an elephant in the room?
  • 19. 0 Day Exploits - Guaranteed
  • 21. Our security enemy is? Security Nightmare
  • 28. Effective Security is hidden deep underneath… Technology ProcessPeople
  • 30. Modeling Risk and Threats Threats Vulnerabilities Controls Risks Assets Security Requirements Business Impact exploit exposeincreaseincrease increase have protect against met by indicate reduce
  • 31. CONSEQUENCE LIKLIEHOOD FV T Risk Group 1 Risk Group 2 Risk Group 3 HighLow L o w H i g h RESPONSE PROTECTION Target Risk Risk Reduction Strategies!
  • 32. 4As A4 of Security Assess Evaluate, Audit, Check Architect Plan, Design Apply Build, Implement, Do Administer Operate, Act
  • 33. 5As A5 of Security Assess Evaluate, Audit, Check Architect Plan, Design Apply Build, Implement, Do Administer Operate, Act Awareness Intelligence, User
  • 34. 6As A6 of Security Assess Evaluate, Audit, Check Architect Plan, Design Apply Build, Implement, Do Administer Operate, Act Awareness Intelligence, User Agility Timeliness of Response
  • 35. A6 - Process Business Risk Controls Maturity
  • 37. The « defence in depth »
  • 38. TBS- Time Based Security Protection DetectionResponse SECURITY P>D+R Anti-virus VPN Firewall, IPS Access Control Grid Time Response Patch Mgmt Incidence Response Disaster Recovery Vulnerability Testing SIEM Log Correlation CCTV, Access Control
  • 40. Cyber Attack Recovery Agility Risk Active Business Can you successfully recover?
  • 41. Road to Security Metrics Security Metrics KPIs, Testing Results CSA Controls, Compliance, Operational, Financial CoBIT SOX ISMS ISO27001 PCI HIPAA Time Based Security ISMS ISO22301 ISMS ISO20000
  • 42. Final Goal Is Total Integrated Security Information Security Management IoT, Device Security Management
  • 43. Winning the War Red Teaming Solve Attribution Continuous Vulnerability Mgmt Crowd Sourcing/Bug Bounty Fusing Crisis Management Vertical CERT Integration Encryption Exchange Knowledge Data Leak Prevention Threat Management Reputation Management Big Data Honeynets Machine Learning Sandbox Security Metrics Empower end users Continuous Training Attack / Take down
  • 44. 10As A10 of Security Assess Evaluate, Audit, Check Architect Plan, Design Apply Build, Implement, Do Administer Operate, Act, Respond Awareness Intelligence, User Agility Timeliness of Response Appetite How much Risk can you take? Alignment Business focus Assumption Something is wrong? Authorization Right to access, authentication
  • 45. Don’t bring a knife to gun fight
  • 46. “…Security is a continuous skilled process…”… Jorge Sebastiao http://linkedin.com/in/sebastiao
  • 47. Questions Jorge Sebastiao, CISSP ICT Expert Huawei http://linkedin.com/in/sebastiao/ Twitter: @4jorge