SlideShare a Scribd company logo
Marc Vael
International Vice-
President
Tackling Cybercrime
The view of auditor on cybercrime
The view of auditor on cybercrime
ISACA, 2013 Responding to targeted cyberattacks
ISACA, 2013 Responding to targeted cyberattacks
ISACA, 2013 Responding to targeted cyberattacks
ISACA, 2013 Transforming Cybersecurity using COBIT5
ISACA, 2013 Transforming Cybersecurity using COBIT5
Impact of an attack on the business
Managing cybercrime risks
appropriately
ISACA, 2013 Transforming Cybersecurity using COBIT5
www.isaca.org/cobit
The view of auditor on cybercrime
The view of auditor on cybercrime
The view of auditor on cybercrime
People are the weakest link. 

You can have the best technology,
firewalls, intrusion-detection systems,
biometric devices - and somebody
can call an unsuspecting employee.
That's all she wrote, baby. 

They got everything.
Kevin Mitnick, ex hacker, IT security consultant.
The view of auditor on cybercrime
The view of auditor on cybercrime
The view of auditor on cybercrime
Your security solution
is as strong …
… as its weakest link
The view of auditor on cybercrime
The view of auditor on cybercrime
http://www.isaca.org/Knowledge-Center/Research/Pages/Cybersecurity.aspx
www.isaca.org/cobit
marc@vael.net
Marc Vael
CISA, CISM, CRISC, CGEIT, ITIL SM, Prince2
F, Guberna Certified Director
www.isaca.org
Contact information
Follow Marc Vael on Twitter http://twitter.com/marcvael
Join Marc Vael on Linkedin: http://www.linkedin.com/in/marcvael

More Related Content

PDF
Midsize Business Solutions: Cybersecurity
PDF
Cyber Security Challenges: how are we facing them?
PDF
Advantages of privacy by design in IoE
PDF
Pervasive Security Across Your Extended Network
PPTX
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
PPTX
Business Continuity and app Security
PDF
BCS ITNow 201409 - What's Going On
PDF
Data Center Security Challenges
Midsize Business Solutions: Cybersecurity
Cyber Security Challenges: how are we facing them?
Advantages of privacy by design in IoE
Pervasive Security Across Your Extended Network
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Business Continuity and app Security
BCS ITNow 201409 - What's Going On
Data Center Security Challenges

What's hot (19)

PPTX
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
PDF
Integrated Network Security Strategies
PDF
Web hacking using Cyber range
PDF
NIST Zero Trust Explained
PDF
Zymr Cybersecurity
PDF
CV | Michele Spagnuolo
PDF
Intelligent Cybersecurity for the Real World
PDF
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
PDF
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
PPTX
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
PDF
cybersecurity es
PDF
Canarie kathryn anthonisen 16 9 rev
PDF
Why Cisco-for-Security
PPTX
The Ugly Cost of Cyber Crime
PDF
IGPC Data Breach Planning braindump
PDF
Outpost24 Webinar - Common wireless security threats and how to avoid them
PDF
Sikkerhed & Compliance i en cloud-verden
PDF
Cyber Security 4.0 conference 30 November 2016
POTX
Ransomware: Why Are Backup Vendors Trying To Scare You?
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Integrated Network Security Strategies
Web hacking using Cyber range
NIST Zero Trust Explained
Zymr Cybersecurity
CV | Michele Spagnuolo
Intelligent Cybersecurity for the Real World
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
cybersecurity es
Canarie kathryn anthonisen 16 9 rev
Why Cisco-for-Security
The Ugly Cost of Cyber Crime
IGPC Data Breach Planning braindump
Outpost24 Webinar - Common wireless security threats and how to avoid them
Sikkerhed & Compliance i en cloud-verden
Cyber Security 4.0 conference 30 November 2016
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ad

Similar to The view of auditor on cybercrime (20)

PDF
40 under 40 in Cybersecurity year 2022.pdf
PDF
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
PDF
40 under 40 in cybersecurity. top cyber news magazine
PDF
Sonic WALL Secure Wireless Network Integrated Solutions Guide 1st Edition Joe...
PDF
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
PDF
James Castle for Top Cyber News MAGAZINE November 2024
PPTX
CYBERSECURITY TRACK.pptx
PDF
MT 117 Key Innovations in Cybersecurity
PDF
Hamad Al Wazzan Shaping the Future of IT.pdf
PPTX
CYBER SECURITY WORKSHOP (Only For Educational Purpose)
PDF
Career Opportunities in Cyber Security
PDF
Most Trusted Cyber Security Companies May 2024.pdf
PDF
Carbon Black: Keys to Shutting Down Attacks
PDF
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
PDF
CyberSecurity - UH IEEE Presentation 2015-04
PDF
Raise The Cybersecurity Curtain! Be The Voice!
PDF
Looking into the future of security
PPTX
Cyber Security: A Common Problem 2018
40 under 40 in Cybersecurity year 2022.pdf
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in cybersecurity. top cyber news magazine
Sonic WALL Secure Wireless Network Integrated Solutions Guide 1st Edition Joe...
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
James Castle for Top Cyber News MAGAZINE November 2024
CYBERSECURITY TRACK.pptx
MT 117 Key Innovations in Cybersecurity
Hamad Al Wazzan Shaping the Future of IT.pdf
CYBER SECURITY WORKSHOP (Only For Educational Purpose)
Career Opportunities in Cyber Security
Most Trusted Cyber Security Companies May 2024.pdf
Carbon Black: Keys to Shutting Down Attacks
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Raise The Cybersecurity Curtain! Be The Voice!
Looking into the future of security
Cyber Security: A Common Problem 2018
Ad

More from Marc Vael (20)

PDF
How secure are chat and webconf tools
PDF
my experience as ciso
PDF
Cybersecurity governance existing frameworks (nov 2015)
PDF
Cybersecurity nexus vision
PDF
ISACA Reporting relevant IT risks to stakeholders
PDF
Cloud security lessons learned and audit
PDF
Value-added it auditing
PDF
ISACA Internet of Things open forum presentation
PDF
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
PDF
The value of big data analytics
PDF
Social media risks and controls
PDF
ISACA Mobile Payments Forum presentation
PDF
Belgian Data Protection Commission's new audit programme
PDF
ISACA Cloud Computing Risks
PDF
Information security awareness (sept 2012) bis handout
PPTX
ISACA smart security for smart devices
PPTX
Securing big data (july 2012)
PDF
Valuendo cyberwar and security (jan 2012) handout
PDF
How to handle multilayered IT security today
PPT
ISACA Belgium CERT view 2011
How secure are chat and webconf tools
my experience as ciso
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity nexus vision
ISACA Reporting relevant IT risks to stakeholders
Cloud security lessons learned and audit
Value-added it auditing
ISACA Internet of Things open forum presentation
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
The value of big data analytics
Social media risks and controls
ISACA Mobile Payments Forum presentation
Belgian Data Protection Commission's new audit programme
ISACA Cloud Computing Risks
Information security awareness (sept 2012) bis handout
ISACA smart security for smart devices
Securing big data (july 2012)
Valuendo cyberwar and security (jan 2012) handout
How to handle multilayered IT security today
ISACA Belgium CERT view 2011

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
A Presentation on Artificial Intelligence
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
CIFDAQ's Market Insight: SEC Turns Pro Crypto
A Presentation on Artificial Intelligence
Diabetes mellitus diagnosis method based random forest with bat algorithm
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Monthly Chronicles - July 2025
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Cloud computing and distributed systems.

The view of auditor on cybercrime