Upload
silicon-halton
View
196
Download
0
Embed Size (px)
DESCRIPTION
Enemy at the Gates (Cyber Security) Meetup 53 on March 18, 2014 www.siliconhalton.com twitter.com/siliconhalton
Citation preview
www.siliconhalton.comlinkedin/siliconhalton@siliconhalton
Meetup #53: Enemy at the Gate (Cyber Security)March 18, 2014
• 7:15 pm Welcome • 7:20 pm Announcements• 7:30 pm Panel Keynote:
Enemy at the Gate
• 8:15 pm Mark Your Calendars• 8:20 pm Get To Know Your
Members• 8:30 pm Open Floor• 8:35 pm Networking
Agenda
Show of Hands
• 986+ members• 52 meetups• 8 peer2peer groups• Hundreds of LinkedIn
discussions
Agenda
Tech Conference and Expo
When: Fall 2014
When: Fall 2014Status: Forming “circle” (group). Lot’s of interest!Tonight: Come and see me if you want to help, participate or have ideas!
Panel Keynote
Meetup 53: Enemy at the Gate
• Paul Lewis, Ethtelligent Consulting Inc.• Genaro Liriano, Teranet Inc.
Social Engineering “Alive and Well”
Genaro Liriano, EWSCP, CISSP
Linkedin: http://linkd.in/1g2IeAs
AgendaWhat is Social Engineering?Most Common “Social Engineering
Attacks”Defense against Social Engineering
AttacksQ & A
What is Social Engineering?Social Engineering; is the art of manipulating people into
performing actions or divulging confidential information.“It is an act of psychological manipulation ”
It is typically trickery or deception for the purpose of information gathering, fraud, or computer system access. In most cases the attacker never comes face to face with the victim or victims.
Most Common “Social Engineering Attacks”
The technical way on breaking into computer systems by brute-forcing the user logins
or ports have been replaced by sophisticated methods that are easier and yield better
and faster results based on human psychology.
These attacks can help the “attacker\social engineer” get access to any system
irrespective of the platform, software or hardware involved.
Here are some of the most common Social Engineering Attacks:
Defense against Social Engineering AttacksThere is not any effective way to defend against Social Engineering attacks. However, implementing a layer protection approach would help us defend against the many different types of Social Engineering attacks. Some of these layers or steps would help you against “Social Engineering
Attacks”: Security Awareness Training Background Verification Physical Security Mock Social Engineering Drills Data Classification policy
Defense against Social Engineering Attacks continued …To reduce the success of Social Engineering attacks the following controls must be taken care of: Ensure your Firewalls, Antivirus, Anti-Malware and email filters are
receiving periodical update. Never Allow people to tailgate with you. Report any security threat. Do not use your corporate domain IDs on Social Media or public
domains. Pay attention to the URL of suspicious Web-sites. Do not access or read any confidential information in Public (Train,
Bus, Park). Do not send sensitive information over the internet before checking a
web site security. Ensure you shred any documents that is discarded that contains
sensitive data.
Paul Lewis CISSP CIPP/C CIPP/IT
Ethtelligent Consulting Inc.LinkedIn http://tinyurl.com/mnkztxc
Security as a small businessWhat do you care about?What do your clients care about?What threats apply to you?Home working to small office/enterprisePolicies, procedures, and paperBackups, mobile stuff and cloudsPrivacy is cheap except when it bites
someoneStrange but real threats
Security Panel – Q&A
Paul Lewis Ethtelligent Consulting
Inc.
Genaro LirianoTeranet Inc.
Mark Your Calendars
SoloPreneur Peer2Peer #32• March 20, 2014, 8:30 - 10am• Hampton Restaurant at the
Quality Suites Hotel, Oakville
Silicon Halton Workshop Day @ Burlington HiVE
• Mar 26, 2014. Open 8am – 6pm• 10 workshops: 1pm – 4pm• Free for Silicon Halton members• Not an 8-hr business social event, do your work,
attend as many or as few workshops as you wish• Learn more: http://bit.ly/LDi6ou• Help share the flyer
1pm - 2pm Think You're Ready for Investors?
Shifting Gears Startup Sales Tactics
2pm - 3pm Leveraging Government Funding
Patents and Startups
Using Social Media to Prospect
3pm - 4pm Taking a Byte out of Taxes
First or Early Hires Relationship Selling
#shlearn
Ten Workshops to Accelerate your Business!
Bring your laptop. #shlearn
• Think You're Ready for Outside Investor Funding?• Leveraging Government Funding to Grow Your Business• Taking a Byte out of Taxes
• Shifting Gears: Five Steps to Accelerate Business Success • Patents and Startups• First or Early Hires - Getting it right & avoiding the pitfalls
• Startup Sales Tactics • Using Social Media to Prospect & Build Your Network • Relationship Selling – Uncover Opportunities, Close Sales
and Build Loyalty• 3 ways to turbo-charge innovation
Give us your business card for flyer
New Tech Meetup, Meetup 54
• April 8, 2014. 7pm• QE Park, Oakville• Learn more:
http://bit.ly/shmeetup54
Thanks to #Oakville EcDev for space!
Oakville's 1st Open Data Community Meetup
• March 27, 2014. 1-3pm• April 2, 2014. 7-9pm
Details: http://bit.ly/1idqtCZRegistration: http://bit.ly/NoSCeW
#G2KYM Owner:Brett JohnstonLandslide Marketing@LandslideMktg
Allison J. Speigal
www.linkedin.com/in/allisonspeigel
Val Sanna
THE CREATIVE SPARKTO POWER YOUR BRAND SUCCESS
BRAND IDENTITY / COMMUNICATION DESIGN / WEB DESIGN
905.845.1055 / www.ignitiondesign.ca
@ValSanna
Brian Hickey
UTILIZING THE POWER OF VIDEO TO CREATE POWERFUL CONTENT
Brian Hickey, Owner
Phone: 905-299-8117Twitter: @72bluemedia @b_j_hickeyLinkedIn.com/in/bjhickey
www.72bluemedia.com
• Servicing small to mid size businesses in the Peel, Halton, Hamilton-Wentworth, Niagara, and Waterloo Regions
• Working with Silicon Halton I hope to be a valued member in discussions of content marketing through video
Open Floor