2025 Hochschule Schmalkalden Presentation PDF
Document Details
![EnrapturedEllipsis102](https://quizgecko.com/images/avatars/avatar-16.webp)
Uploaded by EnrapturedEllipsis102
Hochschule Schmalkalden
2025
Tags
Related
- Certified Cybersecurity Technician Information Security Threats And Vulnerabilities PDF
- Information Security Drivers PDF
- MGT447 Ch-05 E-commerce Security and Payment Systems PDF
- 01 Handout 1 PDF - Information Systems Security
- Information Assurance and Security (2024) PDF
- Business Information Management PDF
Summary
This presentation for Hochschule Schmalkalden discusses various IT security topics, including cyber threats, business impact analysis, and user awareness. The date is 06.01.2025.
Full Transcript
Hochschule Schmalkalden 06.01.2025 Who Is This Guy?? Tibor Toronyi – Head of Infrastructure & Security WEPA 45 years IT experience Programming, system administration, network, cybersecurity and destroying electronics Various Industries Managed service provider Educat...
Hochschule Schmalkalden 06.01.2025 Who Is This Guy?? Tibor Toronyi – Head of Infrastructure & Security WEPA 45 years IT experience Programming, system administration, network, cybersecurity and destroying electronics Various Industries Managed service provider Education Healthcare Automotive Steel galvanizing Spirits & Wines Hygienic Paper Neural Networks An Introduction to High-Frequency Finance – Ramazan Gencay Husband of Frau Dr. Toronyi |2 January 2025 | Group Digital Operations WEPA Founded 1948 - 75 Years Second largest manufacturer hygienic paper products in Europe 4.500 employees 15 plants in 6 countries Together For A Better Life Raw Pulp De-Ink Paper Water Electricity Sustainability Business Units Consumer / Professional Venture Foundation World Record 01.2024 - 2.250 mpm – 3.240 kms |3 January 2025 | Group Digital Operations IT Business Terminology – The World of Acronyms BIA – Business Impact Analysis Identify, rank and assess the critical assets of the business. DRP – Disaster Recovery Process RTO – Recovery Time Objective – How quickly do assets need to be back up? RPO – Recovery Point Objective – How much data loss is acceptable? SLA – Service Level Agreement Committing resources (human, financial, technical) to meet business requirements BCP Business Continuity Plan – What’s the plan? UI – User Interface Multiple devices, different use cases, remote working – security implications UX – User Experience The Internet is down Information Technology (IT) or Operational Technology (OT) OT is really IT that is used to control the physical world |4 January 2025 | Group Digital Operations Cybersecurity Business Terminology MFA – Multi-factor Authentication Phishing / vPhishing / BEC / Whaling CVSS – Common Vulnerability Scoring System (NAIC) VPN – Virtual Private Network CIR – Cyber-Incident Response ZTA – Zero Trust Architecture (Network, Access, Security) IAM – Identity Access Management EDR, XDR / MXDR, SOC / NOC, IDS / IPS, SIEM, Red / Blue / Purple team |5 January 2025 | Group Digital Operations Threats To Businesses (and you) Projections that cybercrime will reach $20 trillion USD by 2026 Deepfakes Google – “Finance worker pays out $25 million” (CNN - 02.2024) Catfishing Google – “How Fake IT Worker Scams Exploit Remote Hiring” (Forbes – 11.2024) Third Party Do you know what is behind the curtain? AI Quick analysis and more sophisticated automated attacks Cloud Not as safe as you may think. 154% increase in vulnerabilities. Internet of Things Is your television spying on you? State Sponsored / global 23:58:45 - We are closer to midnight than any time in history |6 January 2025 | Group Digital Operations What Does This Mean To Me? Know your business and your part Situational awareness Chances are, you will be the cause of the next security breach. |7 January 2025 | Group Digital Operations In case of questions, please don’t hesitate to contact us