Hybrid Threats, Cyberwarfare
What's Next?
"ATTACK ON HOLM CITY "
WAS PART OF 2023 CONFERENCE
Read More
THE BEST 2023 Aftermovie - Nordic IT Security
Thank you for taking your place in our 2023 conference and helping us to create unique opportunity for
Partners, Delegates and Speakers to connect with the cybersecurity industry and share knowledge.
07:00
EXHIBITORS REGISTRATION
07:45
DELEGATE REGISTRATION
08:00
1-1 Meetings
09:00
DDOS and the Rising Tide of ideological Attacks
1. Motivations of Ddos attacks
a. Status, Cash, Ideology
b. Types of Attackers
c. How Ideology is influencing criminals motivated by cash and the takeawa
2. The Threat landscape
a. Zero Days are Overhyped
b. what established the real Threat landscape
3. Types of Ddos Attack
a. Volumetric
b. UDP
c. ICMP
d. Protocol
e. SYN
f. Smurf
g. Application Layer
Brett Johnson
Former US Most Wanted Cybercriminal (Now Good Guy)
10:10
“Understanding Cybercrime with The Original Internet Godfather” Most burning issues of the time in the cyberworld.
Workshop:
Dynamics of Cybercrime
Motivations of Cybercrime
- Status
- Cash
- Idology
- M.I.C.E. (Money, Ideology, Cash, Ego)
Who are the Attackers?
- Criminals
- Nations States
- Terrorists
- Hacktivists
- Insiders
- Hackers for Hire
- Script Kiddies
Understand who is attacking you and why. You will then know the Persistence of the Attack.
What do Criminals Want?
- Information
- Access
- Data
- Cash
Design Security around Who the Attackers are and What they are Wanting.
The Cybercrime Triangle (Why it is never a single attacker)
- Gathering Data
- Committing the Crime
- Cashing Out
- Q&A
The Threat Landscape—Do Zero Days Matter?
- 90%of Attacks use Known Exploits
- 56% of Companies have experienced a breach caused by 3rd parties
- 41% of Routers have the Default Password
- 92% of Every Breach begins with a Phishing Attack
- Q&A
Brett Johnson
Former US Most Wanted Cybercriminal (Now Good Guy)
- Green Room
- Blue Room
- Yellow Room