Download - Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage
![Page 1: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/1.jpg)
Cyber SecurityPutting technology back in the cage..
Tim Holman
CEO, 2-sec
26th February 2015
![Page 2: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/2.jpg)
Tim Holman, CEO 2-sec
• 20 years security experience
• Cyber security, auditing, penetration testing, credit card security, ethical hacking, training, incident response
• The Times, Guardian, Computer Weekly, SC Magazine
• President ISSA-UK
• Fellow of ISSA
• Microsoft MVP Security
17/03/2015
![Page 3: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/3.jpg)
Wall of Shame
• Apple, Dropbox, Snapchat, 2014, password guessing…• Home Depot, 2014, 56 million cards• eBay, 2014 – 145 million passwords• Facebook, 2013 – 6 million records• Adobe, 2013 – 41 million records• Target, 2013 – 110 million records• LinkedIn, 2012 – 6.5 million passwords• eHarmony 2012 – 1.5 million passwords• Sony Online, 2011 – 102 million records• Heartland Payment Systems, 2008-9 – 130 million records• National Archives & Records Admin, 2008 – 76 million records• TJX (TK Maxx), 2006-7 – 46 million records
17/03/2015
![Page 4: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/4.jpg)
Where does all the data go?
![Page 5: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/5.jpg)
YOUR information is for sale
• Credit Card + CCV - $3• Credit Card + CCV + DOB - $35• Credit Card + CCV + DOB + Address - $45
- Balance In Wachovia:………….24K To 80K==========180$- Balance In Boa………………….5K To 45K==========400$- Balance In Credit Union:………Any Amount:=========420$- Balance In Hallifax…………..ANY AMOUNT=========720$- Balance In Compass………….ANY AMOUNT=========700$- Balance In Wellsfargo……….ANY AMOUNT=========800$- Balance In Barclays………………8K To 10K=========550$- Balance In Abbey:…………………………82K ===========650$- Balance in Hsbc:…………………..50K========650$ and more
• Pay by MoneyGram, Bitcoin only please• 95% guarantee
![Page 6: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/6.jpg)
Cyber Crime is BIG business
• High rewards for little risk:– 2bn+ potential victims (ie Internet users).
– Easy pickings.
• In 2013, Cyber Crime cost £266 BILLION.– It’s already overtaken the global narcotics trade:
• If cybercrime was a country, its GDP would rank 27th -above Singapore, Austria and Denmark.
• One British company told officials that it had incurred revenue losses of £770m because of one attack, through the loss of intellectual property.
![Page 7: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/7.jpg)
Why me?
• Why us?
• We’re in the G8.
• We’ll always be targeted.
• We’ve valuable IP.
• To a hacker in a 3rd world country, we’re HNWIs.
• Hackers don’t care who you are, just what you have, or might have.
![Page 8: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/8.jpg)
IP Theft
![Page 9: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/9.jpg)
IP Theft
![Page 10: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/10.jpg)
Military Systems
![Page 11: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/11.jpg)
Industrial Control Systems
![Page 12: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/12.jpg)
Medical Systems
![Page 13: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/13.jpg)
Public Tenders
![Page 14: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/14.jpg)
DNS
![Page 15: Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology back in the cage](https://reader030.vdocuments.us/reader030/viewer/2022020218/55ae4f9f1a28abdc738b473b/html5/thumbnails/15.jpg)
Liberating Technology
• Software, services and products are clearly released to the market in an insecure state.
– That’s how vendors make money.
• There’s no such thing as a vulnerability-free world.
– All major products – hardware and software, seem to be affected.
• If you’re going to buy the next big thing, think carefully as to what risks it will bring to your company.