ACSI Event Presentation v1.0

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Cyber Security Workforce

Readiness

Yoga Kaunang
VP of Business Development
Table of Contents
01 ACSI Background
02 Today’s Cyber Security
Challenges
03 CyberSecurity
Framework
04 Demo
Phishing attack + Ransomware
Acer Cyber Security Inc.
Largest
MSSP in
Taiwan

Over150
billion
events per
month

Intelligent
SOC
Cyber
Security

Global Security Footprint and Alliance


Awarenes
s

Taiwan ➢ Government ISAC


Thailand ➢ CIIP ISAC
➢ Cross-countries
intelligence sharing
Indonesia and correlation
➢ BotNet / honeypots
➢ Threat intelligence
from vendors for
cross correlation
Customer Base (Taiwan)
Professional Certificates
Challenge (COVID-19 /New Normal)

Cloud

Employee (users) Employee (IT


division)
WFH
Become new Opportunity for Hackers

Cloud

Employee (users) Employee (IT


division)
Phishing Attack
• Disguise as official government
• Disguise as your internal IT Support team
• False advice / cure with hidden malware
• False COVID-19 charity
Cyber-Attack Stages

RECONAISSANCE MALWARE COMMAND & LATERAL EXFILTRATION


INSTALLATION CONTROL MOVEMENT
Standards &
Compliances
CyberSecurity Framework

Threat Intel,
Darkweb, hacker’s
SOC
tools (VA-PT)

CyberSecurity CyberSecurity
CyberSecurity People Big Data Information
Technologies

Cyber Range &


Courses Certification
CyberSecurity Training
VA = RECON

✓ IT (Information Technology) VA
o System, Web, Phishing test, App, Source code
o Black box, Grey box, White box
o Intrusive, Non-Intrusive

✓ OT (Operation Technology) VA
o Scada
o ICS (industrial control system)
VA (Vulnerability Assessment) o PLC (Programmable Logic Controller)
DEMO:
Phishing Attack +
Ransomware

You might also like