Course Description

Cybersecurity Masterclass 2018 Description

As information technology becomes ever more complex and Internet usage increasingly widespread, cybersecurity is becoming an increasingly important and business-critical field. Unfortunately, most organizations are not prepared to handle cybersecurity threats. In fact, 66% of IT and security professionals say that their firms are unprepared to recover from a cyber attack . A key example of this unpreparedness is the fact that many of the companies impacted by the WannaCry attack last year didn't install critical updates into their Windows infrastructure that had been released by Microsoft many months before.

Attempting to disrupt the landscape of technologies focused on Cybersecurity is Artificial Intelligence and, more specifically, Deep Learning. Taking the flexibility and thinking capacity of the human mind, digitizing it, and creating a genius system faster, more consistent and potentially more capable than any human brain, deep learning is now plowing through colossal mountains of data, often in real time, to uncover new and often

unexpected relationships, providing unique insights into threats, and empowering improvements to machine learning models and mitigation processes. One of the benefits of these technologies will be to enable analysts or threat responders to focus on the half-dozen critical events of the day (rather than distill 50,000 erroneous alerts generated each day).

Edgar Perez's Masterclass in Cybersecurity will bring CEOs, board members and top executives up to speed on the most recent technologies (such as artificial intelligence) and battle-tested approaches to protect their companies' valuable information and intellectual property from prying eyes of hackers and competitors, and leverage their cyber success in both cultivating stronger relationships with current and new clients and safeguarding the interests of all stakeholders, partners, and employees.

4 Recent Biggest Case Studies CASE STUDY 1: THE “ WANNACRY ” RANSOMWARE ATTACK Lack of cybersecurity discipline leading to crippling business downtime Worldwide cyberattack by the WannaCry ransomware cryptoworm It targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in Bitcoin Within a day, it infected more than 230,000 computers in over 150 countries Britain's National Health Service (NHS), Telefónica, FedEx and Deutsche Bahn were hit along with many other companies worldwide A security patch had been released by Microsoft in March 2017; unfortunately, many organizations didn’t apply it until it was too late The importance of using appropriate software and having the latest security patches installed Insights gained from organizations that proactively leveraged cybersecurity to encourage customer satisfaction and maximize retention

CASE STUDY 2: HOME DEPOT’S CUSTOMER DATA HACK From phishing attack to a vendor to a $179 million loss September payment data systems breached (5 months’ worth of data) 56 million credit and debit cards, numbers, expiration dates and CCVs 53 million customer email addresses Hackers gained access to Home Depot’s network by phishing the login credentials of one of its vendors and exploiting unpatched Windows vulnerability Installed malware on self-checkout registers As of March 2017, cost of the breach is at least $179 million Final total likely to be much higher because of legal fees and any other undisclosed payouts

CASE STUDY 3: 83 MILLION ACCOUNTS HACKED AT JPMORGAN CHASE Vendor Compromise Leading to Largest Financial Services Breach By July 2014, a Russian crime ring was able to amass 1.2 billion unique username and password combinations JPMorgan Chase determined that some of these combinations allowed access to its Corporate Challenge website Hackers had obtained the website certificate from the site’s vendor, Simmco Data Systems; this allowed them to pose as the race website operator and intercept traffic, such as race participants’ login credentials A few weeks later, the bank learned that its systems had been breached as well. Hackers tested stolen usernames and passwords on an older system handling bank employee benefits. When those worked, they tested the credentials on other bank systems Ultimately, JPMorgan Chase’s attackers compromised 90 servers storing contact information for current and former customers The attack ultimately impacted 76 million households and 7 million small businesses

CASE STUDY 4 : WHEN THE BEST TECHNOLOGY CAN’T REPLACE HUMAN JUDGEMENT Little Holiday Cheer as 40 Million Credit Cards Numbers are Stolen On December 12, 2013, the FBI alerted Target of a massive data breach Three days later, the firm confirmed an attack and eradicated malware designed to steal credit card data used at the firm’s 1,797 stores surreptitiously installed in their POS system Six months earlier, the firm had begun installing a $1.6 million malware detection tool made by FireEye.Specialists in Bangalore would monitor its computers around the clock and alert the firm’s IT team in Minneapolis By mid-November , however , intruders had gained access to the system by using stolen credentials from a third-party vendor On Saturday , November 30, two days after Thanksgiving, hackers were spotted by FireEye’s tool as they were ready to start data exfiltration. Bangalore got an alert and flagged the firm’s security team. They did nothing Target stood by as 40 million credit card numbers flowed out of its computers For registration contact us at 022-62210100 or email us raj@marcepinc.com





