Empowering Cybersecurity with Made in Europe AI Technology

made in europe n.w
1 / 9
Embed
Share

"Explore the robust cybersecurity solutions offered by Made in Europe AI technology, focusing on preventive security measures, threat intelligence, ethical hacking, and incident response to mitigate risks and protect business assets. Gain insights into information management and data evolution strategies to enhance decision-making and risk analysis processes."

  • Europe AI
  • Cybersecurity
  • Threat Intelligence
  • Incident Response
  • Information Management

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. MADE IN EUROPE AI powered cybersecurity Ferenc Fr sz

  2. Cyber Services zleti informci / business information The currrentsituation MADE IN EUROPE With damage related to cybercrime projected to hit hit $6 trillion annually hit hit $6 trillion annually $6 trillion $6 trillion annually annually by 2021 hit $6 trillion annually 2/42 Cyber Services zleti inform ci / business information

  3. Cyber Services zleti informci / business information Portfolio Cyber securityservices in a healthylifecycle MADE IN EUROPE Preventive (proactive) security APPLIED INTELLIGENCE or CTI (CYBER THREAT INTELLIGENCE) AWARENESS ETHICAL HACKING GAMIFICATION CYBER EXERCISES Information exchange EARLY WARNING (VULNERABILITY INFORMATION EXCHANGE) BUSINESS PROCESS REENGINEERING TEAM DEVELOPMENT DECISION SUPPORT 3rd PARTIES IIEX CTI / APPLEID INTELLIGENCE Mitigation Managed security services (security as a service) RISK AND IMPACT MITIGATION SYSTEM HARDENING SOFTWARE REFACTORING MONITORING LOG MANAGEMENT INCIDENT MANAGEMENT VULNERABILITY MANAGEMENT APT and ZERODAY MANAGEMENT Incident response INCIDENT INVESTIGATION COMPUTER AND NETWORK FORENSICS MALWARE ANALYSIS APPLIED INTELLIGENCE 3/42 Cyber Services zleti inform ci / business information

  4. Cyber Services zleti informci / business information Levels of information Data evolution MADE IN EUROPE Wisdom Knowledge management Knowledge Information Information management Data 4/42 Cyber Services zleti inform ci / business information

  5. Cyber Services zleti informci / business information Levels of information Data evolution MADE IN EUROPE Wisdom Focus: Decision making Knowledge management Focus: Knowledge Risk analysis processes Mitigations Focus: Information KPI s Patternrecognitions Information management Focus: Data Scan results Tool reports Logging events 5/42 Cyber Services zleti inform ci / business information

  6. Cyber Services zleti informci / business information Missingstandpoints MADE IN EUROPE Knowing business processes to protect Information of vulnerabilities of assets Knowing all assets to protect Catalogue of data 6/42 Cyber Services zleti inform ci / business information

  7. Cyber Services zleti informci / business information Cyber securitykill chain MADE IN EUROPE Phase 1: Preparation Phase 2: Intrusion Phase 3: Breach Action on objective Reconnaissance Weaponization Delivery Exploitation Installation C2 Proactive Reactive Monitoring privilege escalations Limiting the exposure critical information Eliminating vulnerabilities Monitoring malicious events Monitoring user activities Monitoring data exfiltrations Responding to a breach 7/42 Cyber Services zleti inform ci / business information

  8. Cyber Services zleti informci / business information The Diamond Model MADE IN EUROPE Diamond Model to analyse attacker capabilities Adversary An analysis needs to be done based on available evidence for each step of the Cyber Kill Chain. Infrastructure Capability/TTP Attribution of an attacker is based on outcome of diamond model analysis. This is already Applied Intelligence. Victim 8/42 Cyber Services zleti inform ci / business information

  9. MADE IN EUROPE Thank you for your attention

Related


More Related Content