DIGITAL FORENSICS. We Place Digital Evidence at Your Fingertips. Cyanre is South Africa's leading provider of computer and digital forensic services

Similar documents
FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Security & Phishing

Legal Foundation and Enforcement: Promoting Cybersecurity

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

locuz.com SOC Services

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

EMERGING TRENDS IN WHITE COLLAR CRIMES

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

You ve Been Hacked Now What? Incident Response Tabletop Exercise

The State of the Hack. Kevin Mandia MANDIANT

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Securing Information Systems

PEOPLE CENTRIC SECURITY THE NEW

ISACA West Florida Chapter - Cybersecurity Event

Cyber Insurance: What is your bank doing to manage risk? presented by

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

Gujarat Forensic Sciences University

DeMystifying Data Breaches and Information Security Compliance

ID Theft and Data Breach Mitigation

Cyber Risks in the Boardroom Conference

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Certified Cyber Security Analyst VS-1160

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break.

RSA INCIDENT RESPONSE SERVICES

Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

A Forensic Accountant in Cyber Security

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Template for data breach notifications I

What to do if your business is the victim of a data or security breach?

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Computer forensics Aiman Al-Refaei

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Security Awareness Training Courses

RSA INCIDENT RESPONSE SERVICES

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013

CyberEdge. End-to-End Cyber Risk Management Solutions

Cybersecurity The Evolving Landscape

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Presented by: Njei Check Head, Audit Security Division, ANTIC

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Evolution of Spear Phishing. White Paper

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Keep the Door Open for Users and Closed to Hackers

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Contact us What makes us different Dinesh Anand Our offices Forensic Bangalore Kolkata Cutting-edge technology to deliver more efficiently Services

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

Short courses presented by the NWU Programme in Forensic Accountancy

Incident Scale

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Speakers. Shellie Zavatsky Director of Internal Audit at Hurley Medical Center. Trent Long Director of Managed Privacy Services at FairWarning, Inc

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

PROVIDING INVESTIGATIVE SOLUTIONS

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Cybersecurity and Nonprofit

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

INTERPOL For official use only. Fighting with friends

716 West Ave Austin, TX USA

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

June 2 nd, 2016 Security Awareness

Ponemon Institute s 2018 Cost of a Data Breach Study

Preparing for a Breach October 14, 2016

ISC2 EXAM - SSCP. Systems Security Certified Practitioner. Buy Full Product.

SANS 2017 SOC Survey. A Mile of Numbers and a Ton of Stats. Christopher Crowley All Rights Reserved All Wrongs Reversed

CYBER INSURANCE: MANAGING THE RISK

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Privacy Policy Effective May 25 th 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

Personal Cybersecurity

IS Today: Managing in a Digital World 9/17/12

Digital Forensics - Global Market Outlook ( )

Caribbean Cyber Security: Not Only Government s Responsibility

Cyber Incident Response Plan

Bringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams

Cyber Security Updates and Trends Affecting the Real Estate Industry

Are we breached? Deloitte's Cyber Threat Hunting

CYBER RESILIENCE & INCIDENT RESPONSE

Investigative Response Case Metrics Initiative Preliminary findings from 700+ data compromise investigations

Reducing Liability and Threats through Effective Cybersecurity Risk Measurement. Does Your Security Posture Stand Up to Tomorrow s New Threat?

CRIMINAL NETWORK INTRUSION AND DATA THEFT: Today s Security Landscape and What to Do If You ve Been Compromised

Chapter 6 Network and Internet Security and Privacy

Who We Are! Natalie Timpone

FOR FINANCIAL SERVICES ORGANIZATIONS

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Trends in Mobile Forensics from Cellebrite

PROTECTING BRANDS IN CYBERSPACE

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

Transcription:

DIGITAL FORENSICS We Place Digital Evidence at Your Fingertips Cyanre is South Africa's leading provider of computer and digital forensic services

Cyber Crime taking a Byte out of corporate SA Total Legal and Remedial Cost Feb 2009 IT firm with 400 Blue-chip clients Illegal access to confidential info Interdict Dec 2009 Feb 2010 mail data to clients Full audit on billing process Digital Forensic Investigation Anton Piller Witness Protection Jan 2014 Court Hearing - Nov Verdict

According to MobiForge Report (2014) there is 6,915million (mil) mobile phone users worldwide with 5,400mil in developing nations and 629mil in Africa. - That is 95,5% of the global population, 69,3% of the African population In 2014 276,7mil pc/lpt was sold, 270,7mil tablets, 1895mil mobile phones According to Webopedia, (2014) there was 2,8 zettabytes (2.8 trillion GB) of data created in 2012. It is foretasted that this grows by 46% yearly. It is estimated that we will create 40 trillion GB of data in 2020.

Everyday we send 108,7 billion (bil) e-mails, 2.8 bil Google searches, 144 mil tweets The Radicati Group reported there is 4.1 bil e-mail accounts in 2014, The average person receives and send 121 e-mails per day, 3,6 bil social media accounts in 2014 The FBI already ranks SA 6/7th in its top 10 cyber crime perpetrators list. Cyber Crime Costs SA over R5 Billion in 2014

2015 Breach Statistics 17% Business & Professional Services 10% Financial Services 5% 3% 8% 17% 14% Retail 8% Media & Entertainment 6% 8% Consulting & Engineering 7% 10% 7 % Legal Services 7% High-Tech & IT 7% 7% 8% 8% 14% 7% Government and International Organizations 6% Healthcare 5% Transportation Mandiant 2015 M-Trends Report 3% Aerospace & Defence

Mandiant 2015 M-Trends Report Notification Statistics 100 % Of victims had up to date Anti Virus 69% of Companies hear they have been breached from a 3rd Party Attackers are active and undetected in the environment for 205 Days on average 100% of breaches involve stolen Credentials

Threat Landscape Deposit Scams Accommodation scams Puppy Scams 419 Scam Red Hat Black Hat Smishing Phishing Grey Hat Phone Phishing Spearing Code Injection Session Hijacking Whaling Spyware Man in the Middle Trojan G-mail Hack BYOD/BOYN Cyber Bullying ID Theft Cyber Harassment

The Face of Cyber Crime

RSA - 2011 cybercrime trends report

Prevention ICT & Security Program Assessment & GAP Analysis Detect Incident Response Assessment & Develop IR Plan Prevent Respond Fraud Readiness Assessment over Risk Divisions & Threat Mapping Litigation Support Assesment of and drafting of Policy, Governance & standards (SOP) ito Intelligence Platform, Forensics & Risk Management, DFL, SOC

Original 14) Where law requires information to be presented or retained in its original form, that requirement is met by a data message if: the integrity of the information from the time when it was first generated in its final form as a data message or otherwise has passed assessment in terms of subsection (2);

For the purposes of subsection 1(a), the integrity must be assessed: by considering whether the information has remained complete and unaltered, except for the addition of any endorsement and any change which arises in the normal course of communication, storage and display;

Admissibility and evidential weight of data messages 15. (1) In any legal proceedings, the rules of evidence must not be applied so as to deny the admissibility of a data message, in evidencea.on the mere grounds that it is constituted by a data message; (2) Information in the form of a data message must be given due evidential weight. (3) In assessing the evidential weight of a data message, regard must be had to- 1.the reliability of the manner in which the data message was generated, stored or communicated; 2.the reliability of the manner in which the integrity of the data message was maintained;

The Role of Digital Forensics Digital forensics is the process of uncovering and interpreting electronic data for use in a judicial matter. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events.

Digital Forensics Mobile Forensics Social Media Forensics Fraud Trend Analysis Incident Response and CIRT E-discovery Insolvency and Business Rescue

Danny Myburgh 082 7812078 www.cyanre.co.za Cyanre is South Africa's leading provider of computer and digital forensic services