Active Offender Report
Active Offender Report
Active Offender Report
© WAVESTONE 2
4 main MOTIVATIONS
• Denial of service • Personal and financial • Logical and/or physical • Trusted sites / software
data theft destruction trapping
• Ideological messages
• Theft of industrial secrets • Strategic data theft • Network eavesdropping
• Information disclosure or strategic data
• Data disclosure • Security mechanism
• Identity theft • Fraudulent transactions bypassing
• Ransom
© WAVESTONE 3
A rapidly GROWING
CYBERCRIME Increasing number of targets
• Digital transformation of companies
• Broad spread of technologies to the public
Accessible expertise
• Skills widely available
• Black Market of Attack Tools
• Mafia organisation
Low risks
• Anonymisation / limited audit trails
• Complex legal response
Important Profits
• Credit card data: $3 to $150
• Personal data: $0.30 to $2
• Business fraud/IP theft: thousands of $
© WAVESTONE 4
CYBERSECURITY
definitely became a C-level topic
© WAVESTONE 5
The WAVESTONE approach
DIGITAL TRUST AS AN
THREATS REGULATIONS
RACE ACCELERATOR
© WAVESTONE 6
PRACTICE CYBERSECURITY & DIGITAL TRUST PRESENTATION
/ Tooled consulting for master plan / Co-led engagements with / In the trenches since 1995 with a
definition, IoT, audit, incident business experts from other strong involvement in security
response… Wavestone practices to bring more communities
value
/ Recurrent invited speaker at leading / Recognition of the authorities
technical international / Current and wide-ranging thought through certification and
conferences (Blackhat, DEF CON…) leadership on hot topics for participation to specific workgroups
specific businesses: bank and
/ Mentor for cybersecurity start-ups
fraud, industrial systems, digital PASSI qualification
for different incubators, publisher of
compliance for consumer goods…
the French and UK start-up radar
ISO27001 certification
for security audit
© WAVESTONE 8
PRACTICE CYBERSECURITY & DIGITAL TRUST PRESENTATION
REGULATIONS CLOUD & AGILE CYBER IoT & INDUSTRIAL IA & MACHINE
(NIS/LPM & GDPR) RESILIENCE CONTROL SYSTEMS LEARNING
Find the appropriate Deployment is a reality, Include a scenario of IS- A breakthrough in Machine Learning is the
perimeter to limit impact adopt a new security wide logical destruction industrialized protection new frontier to help fight
whilst ensuring model to take it into with crisis management systems with new secure fraud and cyberattack
appropriate level of account but also new and certified solutions to
security technological solutions assess
Use it as a business
differentiator
© WAVESTONE 9
Gérôme BILLOIS
Partner
[email protected]
@gbillois
Florian POUCHET
Senior Manager
[email protected]
+44 7493 86 77 66
@poulti
wavestone.com
@wavestone_
PARIS
LONDON
NEW YORK
HONG KONG
SINGAPORE *
DUBAI *
SAO PAULO *
LUXEMBOURG
MADRID *
MILANO *
BRUSSELS
GENEVA
CASABLANCA
ISTANBUL *
LYON
MARSEILLE
NANTES
* Partnerships