Cybersecurity Masterclass 2018

31/05/2018 Event Services

Price: 400.00 ₹

Description

4 Recent Biggest Case Studies
CASE STUDY 1: THE “WANNACRY” RANSOMWARE ATTACK
Lack of cybersecurity discipline leading to crippling business downtime
Worldwide cyberattack by the WannaCry ransomware cryptoworm
It targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in Bitcoin
Within a day, it infected more than 230,000 computers in over 150 countries
Britain's National Health Service (NHS), Telefónica, FedEx and Deutsche Bahn were hit along with many other companies worldwide
A security patch had been released by Microsoft in March 2017; unfortunately, many organizations didn’t apply it until it was too late
The importance of using appropriate software and having the latest security patches installed
Insights gained from organizations that proactively leveraged cybersecurity to encourage customer satisfaction and maximize retention

CASE STUDY 2: HOME DEPOT’S CUSTOMER DATA HACK
From phishing attack to a vendor to a $179 million loss
September payment data systems breached (5 months’ worth of data)
56 million credit and debit cards, numbers, expiration dates and CCVs
53 million customer email addresses
Hackers gained access to Home Depot’s network by phishing the login credentials of one of its vendors and exploiting unpatched Windows vulnerability
Installed malware on self-checkout registers
As of March 2017, cost of the breach is at least $179 million
Final total likely to be much higher because of legal fees and any other undisclosed payouts

CASE STUDY 3: 83 MILLION ACCOUNTS HACKED AT JPMORGAN CHASE
Vendor Compromise Leading to Largest Financial Services Breach
By July 2014, a Russian crime ring was able to amass 1.2 billion unique username and password combinations
JPMorgan Chase determined that some of these combinations allowed access to its Corporate Challenge website
Hackers had obtained the website certificate from the site’s vendor, Simmco Data Systems; this allowed them to pose as the race website operator and intercept traffic, such as race participants’ login credentials
A few weeks later, the bank learned that its systems had been breached as well. Hackers tested stolen usernames and passwords on an older system handling bank employee benefits. When those worked, they tested the credentials on other bank systems
Ultimately, JPMorgan Chase’s attackers compromised 90 servers storing contact information for current and former customers
The attack ultimately impacted 76 million households and 7 million small businesses

CASE STUDY 4: WHEN THE BEST TECHNOLOGY CAN’T REPLACE HUMAN JUDGEMENT
Little Holiday Cheer as 40 Million Credit Cards Numbers are Stolen
On December 12, 2013, the FBI alerted Target of a massive data breach
Three days later, the firm confirmed an attack and eradicated malware designed to steal credit card data used at the firm’s 1,797 stores surreptitiously installed in their POS system
Six months earlier, the firm had begun installing a $1.6 million malware detection tool made by FireEye.Specialists in Bangalore would monitor its computers around the clock and alert the firm’s IT team in Minneapolis
By mid-November, however, intruders had gained access to the system by using stolen credentials from a third-party vendor
On Saturday, November 30, two days after Thanksgiving, hackers were spotted by FireEye’s tool as they were ready to start data exfiltration. Bangalore got an alert and flagged the firm’s security team. They did nothing
Target stood by as 40 million credit card numbers flowed out of its computers

For registration contact us at 022-62210100 or email us raj@marcepinc.com

More Details

Total Views:16
Reference Id:#1125487
Phone Number:9619046105
Website URL:Click To Visit
Current Rating: /5 0 Vote
Copyright © 2018 |   All Rights Reserved |   tuffclassified.com |   24x7 support |   Email us : info[at]tuffclassified.com