Category

Ciberseguridad

Event on cybersecurity held by ENISA last April 24th

By | Ciberseguridad, Cyber-security, Cybersecurity | No Comments

On April 24th, a new edition of the event on cybersecurity organized by the European Network and Information Security Agency, ENISA, took place in Brussels (Belgium).

The conference was aimed at small and medium enterprises (SMEs), professional associations and public bodies related to the Internet of Things (IoT) and certification activities.

The objective of the event was, on the one hand, to increase awareness and deepen knowledge of the IoT and Industry 4.0 and its effect on the European cybersecurity market. On the other hand, it sought to increase collaboration among the members of ENISA by identifying common interests.

In addition, the ENISA Industry Event provided participants with an overview of the EU Certification Framework and its relationship with the European cybersecurity industry.

About “ENISA Industry Event”

The event, organized since 2015, serves to share knowledge about the cybersecurity sector. The fundamental objective of this activity is none other than to build a community in the cybersecurity sector in both the public and private sectors of the EU.

If you want more information about the event, please click here.

To consult the agenda of the day, please click here.

Impressions on Mundo Hacker Day 2018

By | Ciberseguridad, Cyber-security | No Comments

Mundo Hacker Day 2018Mundo Hacker Day 2018, the reference event on cyber-security in Spain, brought together professionals and experts in the field of cyber-security on April 25 in Madrid.

In this fifth edition, attended by more than 2,000 people, different experts from both Spain and Latin America exposed various relevant issues that affect the world of cyber-security at this time.

Among others, the following talks stood out:

  • The Upside Down World (Stranger Things). Antonio Ramos, Professor, presenter, writer and expert in Hacking and Computer Security.

Antonio Ramos exposed the advantages and disadvantages of the digitalization of society. In his opinion, automation is a positive step for modern societies but, if people are eliminated, digitization would be incomplete.

  • Round Table:

Kasperski: Dani Creus, Senior Security Researcher, Global Research & Analyst Team (GReAT), Kaspersky Lab / ESET: Josep Albors, ESET Spain Responsible for Research and Awareness / Panda Security: Conrado Crespo, Global Presales Consultant Panda Security / Viewnext: Antonio Navas Casado, Director of IS / HP Services: Melchor Sanz, CTO and HP / Sophos Presales Manager: Alberto Ruiz Rodas, Presales Engineer for Spain and Portugal at Sophos / Modera: Daniel de Blas.

  • Ay, ay, ay …. giving the bad guys where it hurts the most! David Conde, SOC / CERT Manager at S21sec

The speaker explained the field experience of the incident response service of S21sec in the fight against some of the most sophisticated organized groups operating in the international arena.

  • Round Table Hack Woman

Silvia Barrera – [IN] IT Security, Researcher, Cybercrime Specialist and Writer / Tamara Hueso – Senior Cybersecurity Analyst (IT-ERS) at Deloitte / Rosa Díaz – General Director Iberia Panda Security / María José Talavera – General Director IBERIA VMware / Albora Trimiño Díez – Cybersecurity Operator, IT Risk Fraud and Security / Miriam Martínez Muñoz – Member of HoneySec, Professor and Researcher at the University of Alcalá / Pilar Vila – Computer forensic expert / María José Montes – Head of cybersecurity of ESET Spain / Moderator: Desireé Rodriguez.

  • Digital Molotov. Gabriel Lazo Canazas.

This expert in cyber-security talked about the dangers of cyber-crime and the Deep Web.

  • Trape: The phising evolution. Jose Pino. Leader of the “TRAPE” development team.

Colombian researcher José Pino presented a TRAPE tool, developed by him, that allows people to track and execute intelligent social engineering attacks in real time.

  • When the threat is inside: detection and early response to attacks with Aruba Introspect. Artur Gradoli, Aruba Solutions Architect, Hewlett Packard Enterprise.

The conference was directed towards large companies. Artur Gradoli explained the importance of monitoring the internal network in the detection of exceptional events.

  • Advanced Digital Threats: Perspective from the trenches. Dani Creus, Senior Security Researcher, Global Research & Analyst Team (GReAT), Kaspersky Lab.

The researcher spoke about the origin of threats in large organizations: 90% are routine threats, 9.9% are directed attacks and only 0.1% are carried out with digital weapons (such as Stuxnet, among others).

  • Recon Tactics . Simón Roses Femerling, CEO of VULNEX.

This expert exposed the methods to train the “blue teams” in companies to deal with external attacks.

  • Ensure Cyber Risk: Ciber Policies , from large multinationals to SMEs, what do they protect? Manuel Huerta, CEO of Lazarus, Expert in Forensic Computing and Professor of Electronic Probatory and Digital Research.

The cyber-risk policies represent a great business opportunity at present, due to the increasing threats to the protection of the data. Faced with an exfiltration of data, companies must face fines of 2% of turnover or 10 million euros if they are SMEs, or 4% of turnover or 40 million euros if they are medium or large companies.

  •  Security operations guided by Intelligence: what is the pyramid of pain? Jorge Hurtado, VP Managed Services & Advanced Cybersecurity Services at S21sec.

Jorge Hurtado spoke about the possibilities that exist to anticipate, detect and react to threats effectively. For this expert, security operations must go hand in hand with the intelligence strategies of the companies’ cyber-defense.

  •      Secret communications and “Stay-Behind” networks: the “Harpoon” project. David Marugán.

This cyber-security consultant gave a brief historical introduction about the Stay-Behind clandestine networks. In addition, he explained the operation at the technical level and of COMSEC (Security of Communications) of the secret espionage networks. He used as an example the FS-5000 transponder equipment “HARPOON”, used since the end of the Cold War for encrypted communications.

If you wish to visualize the agenda of the event, click here.