2023 CyberSummit Presentations
2023 CyberSummit Presentations
What is Cybersecurity?
History of Cybersecurity
Thank you
WHAT IS
CYBER
SECURITY? Cybersecurity is important for
protecting individuals,
businesses, and governments
from a variety of threats,
including malware, phishing
attacks, and data breaches.
Researchers began to explore the
Bob Thomas developed the first antivirus 1960s security implications of interconnected
computer systems.
software, Creeper, which could move across
ARPANET's network. Ray Tomlinson's
Reaper, the first malware antivirus software, 1970s
chased and deleted Creepers. 1987 saw the birth of commercial malware-
examining antiviruses, with Andreas Lüning and
1980s Kai Figge releasing their first software product
The 1990s saw rapid growth and innovation for the Atari ST, the Czechoslovaks creating the
in the Internet, leading to increased cyber first NOD antivirus, and John McAfee launching
attacks. The Morris worm, released in 1988, 1990s VirusScan software in the US.
infected over 6,000 computers, disrupting the
early development of the Internet. In 2000, the first major denial-of-service attack
2000s was launched against the Yahoo! website. And in
2004, the first major data breach occurred at TJX
Companies, exposing the personal information of
over 45 million customers.
2010 - Stuxnet: A sophisticated computer worm that targeted Iranian nuclear
facilities.
2011 - Sony Pictures hack: A cyber attack that targeted Sony Pictures Entertainment,
resulting in the theft of personal information and unreleased films.
2016 - Yahoo! data breaches: Two data breaches that affected over 1 billion Yahoo!
users.
2017 - Yahoo! data breaches: Two data breaches that affected over 1 billion Yahoo!
users.
2019 - Capital One data breach: A data breach that affected over 100 million
customers of the Capital One financial services company.
2020 - SolarWinds Orion hack: A cyber attack that targeted the SolarWinds Orion
software, which is used by many government agencies and businesses around the
world. Microsoft Exchange hack: A cyber attack that targeted the Microsoft Exchange
email server software, resulting in the theft of emails and other sensitive information.
2023 - Shields Health Care Group data breach: The breach affected over 2 million
people and exposed their personal information, including names, addresses, contact
information, and medical records.
There are a number of ways to protect the confidentiality of information, including:
Data validation: This involves checking data to ensure that it is accurate and
complete. For example, a data validation check might ensure that a
customer's address is in a valid format.
Integrity Checksums: A checksum is a value that is calculated based on the contents
of a file or message. If the file or message is changed, the checksum will also
Ensuring that change. This can be used to detect unauthorized changes to data.
information is Digital signatures: A digital signature is a cryptographic technique that can be
accurate and used to verify the authenticity and integrity of a digital message or document.
complete
There are a number of things that organizations can do to improve the availability
of their information systems, including:
Redundancy: Having multiple copies of critical systems and data can help
ensure that they are still available even if one component fails.
Load balancing: Distributing traffic across multiple servers can help improve
Availability the performance and availability of websites and other applications.
Ensuring that Disaster recovery planning: Having a plan in place to recover from a disaster
information is can help minimize the downtime and disruption to business operations.
accessible to authorized
users when needed.
DATA CENTRES
A data centre is a facility that contains computer
systems and other components such as
telecommunications and storage systems.
Data and applications are stored, processed, and distributed via data centres.
Data centres can be cloud-based, which means they are hosted by a third-party
provider, or on-premises, which means they are situated at the organization's
own facilities.
In order to serve important operations like e-commerce, customer relationship
management (CRM), and enterprise resource planning (ERP), data centres are
crucial for many enterprises and organisations.
Security Measures for Data Centers
FIRE SUPPRESSION AND
PHYSICAL EMERGENCY
Physical security measures, such as Fire suppression systems, such as sprinklers and gas extinguishers, can
security guards, fences, and cameras, help put out fires before they cause significant damage. Emergency
can help prevent unauthorized access to response plans can help data center operators respond to incidents, such
data center facilities. as fires, floods, and earthquakes, in a timely and effective manner.
ENVIRONMENT
TECHNICAL Environmental controls, such as temperature and
humidity control, can help protect data center equipment
Firewalls, Intrusion detection systems (IDS)/ Intrusion prevention from damage.
systems (IPS): IDS systems monitor network traffic for suspicious
activity. IPS systems can block suspicious network traffic. Antivirus
software: Antivirus software detects and removes malware from
computer systems. Access control: restrict access to systems to
authorized users.
VUCA
UNCERTAINITY
Overall, SaaS, IaaS, PaaS, VUCA, Big Data, IoE, and IoT
are all important concepts that are shaping the modern
world. By understanding these concepts, businesses and
individuals can better position themselves to succeed in
the VUCA environment.
BIG DATA
Big Data refers to the large and complex datasets that are generated
by modern businesses and organizations. Big Data can be analyzed to
extract valuable insights that can be used to improve decision-making,
operations, and customer experiences.
PAAS
IAAS SAAS
PaaS stands for Platform as a
Service. It is a type of cloud
IaaS stands for Infrastructure computing in which a platform SaaS stands for Software as a
as a Service. It is a type of for developing, running, and Service. It is a type of cloud
cloud computing in which managing applications is computing in which software is
infrastructure, such as servers, delivered to customers over delivered to customers over
storage, and networking, is the internet. PaaS customers the internet. SaaS applications
delivered to customers over can deploy their applications to are typically hosted by a third-
the internet. IaaS customers the PaaS platform without party provider and can be
are responsible for managing having to manage the accessed by customers using
their own applications on the underlying infrastructure. a web browser.
IaaS infrastructure.
Internet of Things
IoT stands for Internet of Things. It is a subset of IoE
that focuses on the connection of physical objects to
the internet for the purpose of collecting and
transmitting data. IoT devices are typically small, low-
cost, and battery-powered. Wearable devices and
smart sensors are examples of IoT devices.
Internet of Everything
IoE stands for Internet of Everything. It is a term used to
describe the network of physical objects that are
connected to the internet. IoE devices can collect and
transmit data, which can be analyzed to extract New business models and opportunities: IoE and IoT are
valuable insights. Smart homes and smart cities are
enabling new business models and opportunities in a
examples of IoE applications.
variety of industries. For example, IoE is being used to
develop new services for smart cities and smart homes.
IoT is being used to develop new products and services
for wearable devices and connected vehicles.
THANK
YOU!
Cyber Crime
&
Cyber
Attack
Hi, I’m Nunudzai Mrewa
● Cyber-attacks are
specific, intentional
actions or activities
that target computer
systems
● The primary objective
of cyber-attacks is to
exploit vulnerabilities,
steal sensitive data,
disrupt services
● Cyber-attacks come in
various forms
Cybercrime
● Cybercrime refers to
criminal activities that
are carried out using
computer networks or
digital devices
● The objective of
cybercriminals is to
commit fraud, theft, data
breaches
● Cybercrimes are typically
committed by
individuals, criminal
organizations, or state-
sponsored actors
Cyber Security
● Cybersecurity
refers to the
practice of
protecting devices.
● The primary goal of
cybersecurity is to
safeguard
information
● Cybersecurity
involves proactive
measures
Security
Functionality Usability
CIA Triad
01 02
Confidentiality Integrity
Keeping information Ensuring that information is
private accurate and trustworthy
03
Availability
Making sure that
information and resources
are accessible when
needed
Protecting the Pillars of Security
Ransomware
business names, names of
directors and
shareholders, addresses.
Source:The Record
● Customers and clients of
the bank may be
Akira
concerned about the
security of their personal
and financial information,
After Effects
theft
● The bank faces immediate
challenges in terms of
cybersecurity, reputation
management, and
potential financial losses
Source:The Record
Common malware families
Source:The PcTechMag
Business
Email
Compromise
● It is a sophisticated type of
cybercrime that involves
cybercriminals
compromising and
Business Email
manipulating email
accounts
● Email Account Compromise
Compromise ● Impersonation
● Social Engineering
Types of Business Email Compromise
Prevention
● Establish clear
verification processes for
financial transactions and
sensitive information
requests
Business
Disruption with
AI
● AI-powered malware and
bots can autonomously
identify vulnerabilities in
target systems and launch
Automating
attacks without human
intervention.
● Attackers can use AI to
Attacks continuously scan for
weaknesses, allowing them
to exploit new
vulnerabilities as they
emerge
● AI can personalize
phishing emails by
Enhanced analyzing the target's
online behavior and
Phishing social media
presence, making the
Attacks emails more
convincing and likely
to succeed
● AI can be used to
create malware that
adapts and changes its
behavior in response to
Evasion security measures.
● Machine learning
Detection algorithms can help
malware remain
undetected by
traditional antivirus
software
Telecoms Fraud
crime Impacts
● Legal and Regulatory
Consequences: Businesses
that experience a data breach
crime Impacts ●
proprietary information
Supply Chain Disruption:
Businesses are interconnected
Business through supply chains, and a
cyberattack on one company can
have a domino effect
Conclusion
● Threats
● Affect
● Mitigation
We need a proactive strategy to execute
on anticipated threats!
Thank you for listening
...and our sets of editable icons
You can resize these icons without losing quality.
You can change the stroke and fill color; just select the icon and click on the paint bucket/pen.
In Google Slides, you can also use Flaticon’s extension, allowing you to customize and add even more icons.
Educational Icons Medical Icons
Business Icons Teamwork Icons
Help & Support Icons Avatar Icons
Creative Process Icons Performing Arts Icons
Nature Icons
SEO & Marketing Icons
CYBER SECURITY IN
ZIMBABWE
Presented by:
Mr. T. Gumindoga
Ministry of ICT, Postal & Courier
Services
Introduction
SMART
PRESENTATION Zimbabwe 2030
OUTLINE
Cyber Security in
Zimbabwe
Conclusion
▪ICT is a powerful economic stimulus.
▪ICTs are the underlying nerve system for sustainable
economic development in any country.
▪The ICT sector has proven to be a strong driver of GDP
growth in nations across the world.
▪One study, “Socio-economic Impact of Internet in
Emerging and Developing Economies” estimates that
INTRODUCTION when Internet penetration rises by 10 percent in emerging
economies, it correlates with an incremental GDP
increase of one to two percent.
▪Zimbabwe, like many other countries globally, is fully
aware of the importance of information and
communication technologies for socio-economic
development and transformation.
• The thrust of NDS1 is to facilitate achievement of an
e-enabled economy where all sectors embrace ICT to
improve efficiency in line with the global trends.
National Priority
Digital Economy
NATIONAL
Economic Growth and
DEVELOPMENT Stability
Areas
STRATEGY(NDS1)
Transport Infrastructure
2021-2025 and Utilities
Governance
• The Ministry of ICTPCS is critical to the attainment of a
Digital Economy through the provision of ICT
solutions and services across all sectors of economy.
• The Ministry’s policy thrust hinges on;
• Improving access to ICTs,
• Increasing ICTs usage,
• Improving ICT governance and
• Ensuring ICT industry growth.
Digital
Digital
entrepreneursh
Platforms
ip
Digital
Econom
y
Digital
Digital Skills Financial
Services
Outcomes
Upper Middle Income Economy by 2030
Smart Government
Smart Agriculture
Smart Transport
Smart Education
Smart Tourism
Smart Mining
Smart Health
Smart Cities
…
Pillars
Partnerships, Skills, Capacity Building and Content Development
Platforms
CYBER SECURITY IN
ZIMBABWE
DATA PROTECTION AUTHORITY/ UNIT
• To regulate the manner in which personal information may
be processed through the establishment of conditions for
the lawful processing of data;
• To promote and enforce fair processing of data in
accordance with this Act;
• To issue its opinion either of its own accord, or at the
request of any person with a legitimate interest, on any
matter relating to the application of the Cyber and data
Protection.
CYBER SECURITY IN • To advise the Minister on matters relating to right to privacy
ZIMBABWE and access to information;
• To receive, by post or electronic means or any other
equivalent means, the complaints lodged against data
processing and give feed-back to the claimants or
complainants;
• To conduct research on policy and legal matters relating to
the development of international best practices on the
protection of personal information in Zimbabwe and advise
the Minister accordingly;
• in consultation with the Minister, to facilitate cross border
cooperation in the enforcement of privacy laws and
participating at national, regional and international forums
mandated to deal with the protection of personal
ZW-CIRT
Bruce Schneier
CAPACITY BUILDING AND AWARENESS
ZIMBABWE
ISMS IMPLEMENTATION
Process
The role of
the human
People Create Technology, Drive it
and Consume it
but also…
Compromise it.
Knowledge is power
Some Interesting Insights
Verizon’s 2019 Data Breach Investigations Report, email was the delivery mechanism
used in 94% of malware attacks
In 2020, the average cost of a data breach was USD 3.86 million globally, and USD 8.64
million in the United States - IBM
Also, in 2020, 93% of cyber attacks started with people instead of technology - Dr. Erik
Huffman, Cyber Psychologist
Verizon’s Business 2022 data breach Investigations Report revealed that the human
element continues to drive breaches, accounting for 82% of all attacks.
New research shows that women make up around 25% of the cybersecurity
workforce.
The Human Element: Cyberchology
7
•
Human Fallibility and Cyber threats
Personality
Naturally, people have preferences and if the technology doesn’t suit them, the strategy fails.
Personality Characteristics Risks
Extraverted Work out ideas by talking them through Vulnerable to manipulation, deceit, and persuasion from
personality cybercriminals (social engineering)
People with a Observe and remember details Take cyber security risks but are more likely to spot Phishing
preference for attacks
sensing
People with a Guided by personal values Likely to fall victim to social engineering attacks than those with
preference for a preference for Thinking
Feeling
However, more cautious and therefore more rigorous when
people with a Systematic or structured.
following cyber security policies
preference for
Judging
People with a Solve problems with logic Can over-estimate their own competence, leading to mistakes
preference for
Thinking
Information Gap
Dunning-Kruger Effect
Technology Change
AI & Decision automation
User Behaviour Analytics – Profiling
Anomaly Detection
AI & Machine Learning
Across all industries, decisions can be Organizations make large investments in Pre-trained models are also available for
made more intelligent, more precise or AI and Machine Learning, adoption, customisation and
more personalized with Machine operationalisation to create business
Learning. value.
setting up data science teams,
collecting and organizing data,
creating ML pipelines and
training models.
Automated Decision Services
Machine Learning and Business
Rules are Complementary
Use Case Machine Learning Business Rules
17
Intelligent decisions - Leverage
predictions, and decide with rules
Prescriptive Predictive Customer
Rules + Models = Response
18
Decision Automation enables Continuous
Improvement
Machine Predictions
Decision Decisions
Business Operational
Outcomes
Learning Automation Applications Data
Policies
Business Rules
19
Benefits of Rule
Learning/Transparent ML
Transparency
The model is readable (rules, scorecard)
Predictions are directly explainable
Prediction rules are modifiable
Lifecycle aligned with policy rules
AI topical issues
Smart
automatically
▪ Its easier to monitor and control several sites remotely
Surveillance ▪ Edge Computing capabilities reduce bandwidth consumption.
▪ Surveillance is most controversial aspect of AI in ethics. Magnifies
the ability to intrude on privacy and personal details
The essence of time and attendance
[email protected]
0713385554
“CYBER FRAUD SUMMIT”
CYBER SECURITY | CYBER FINANCIAL CRIME
Cyber Crime and Cyberattacks
Sprayview Hotel | Victoria Falls| 18 – 22 September 2023
Eng Prudence Kadebu|+263 713385554 | [email protected]
Outline
Cybersecurity
Cybercrime
Cyber Financial Crime
Digital Hijacking
Business Email Compromise
Cyber world and Retail, Rentals and
Telecoms Fraud
Cybercrime
Financial Crime
• Cybercrime
Market Abuse and Insider Trading
Criminals or insider Market manipulation is when a market
for securities is inflated or deflated to
traders manipulate make it appear that securities are
the market rules worth more or less than their true
value.
and regulations and
gain secret • E.g. the issuer of securities gives
information from money to several people it controls
so that those people will acquire
within the entity, the securities fabricate the
using their power of existence of a market for them.
position personal High demand for an asset = High
financial gain. market value
Digital Hijacks
Cyber /Digital hijacking, or computer
hijacking, occurs when an attacker takes
control of computer systems, software
programs, and/or network communications.
• Electronic Account Hijacking- a cybercriminal obtains
personal banking information and uses it to take over
your bank accounts. WhatsApp Account Take-Over
• Domain Hijacking – Through phishing, attackers take
over your control panel and point it to a scam site they
control.
• Ransomware Attacks – Targeted at companies
demanding a ransom as high as $70m. RaaS new norm.
• Browser hijacking is most often used to compel a
victim to click on adverts, change the default browser
settings, or reroute online traffic.
• “the largest and most Beginning in September 2019, the threat actor
first conducted a “dry run,” injecting test code
sophisticated attack the world into SolarWinds’ network management and
has ever seen,” Microsoft Corp monitoring suite of products called Orion.
Study:
later included in SolarWinds’ Orion software
up to 18,000 SolarWinds updates.
customers that used the
Solarwinds company’s Orion network
monitoring software SolarWinds released the software updates to its
Corp
customers not realizing that the updates were
compromised.
• hackers got access to emails at
Attack the U.S. Treasury, Justice and
Commerce departments and The trojanized code had provided the threat
actor with a “backdoor”—a program that can
other agencies give an intruder remote access to an infected
computer.
• Microsoft and many U.S.
Government Agencies. The threat actor was then able to remotely
exploit the networks and systems of SolarWinds’
• cyber hijacking since the hackers customers who had downloaded the
compromised software updates using a
took control of Orion’s software sophisticated computing infrastructure.
compilation process to include a
backdoor in authentic, software
updates.
https://www.gao.gov/blog/solarwinds-cyberattack-demands-significant-federal-and-private-sector-response-infographic
Business email
compromise
issues
• A damaging form of cybercrime, with the potential
to cost a company millions of dollars.
• A form of phishing scam.
• Attackers often impersonate a trusted person or
entity like an executive, vendor, brand, or internal
system to fool a victim.
• BEC losses involving cryptocurrency rank highest.
• Look out for these forms of BEC:
• Urgent payment required scams
• Gift cards and wire transfers
• Credential compromise scams
Prevention tactics and safeguards to educate
and mitigate risk of business email compromise
Businesses aim to provide the best user experience while reducing fraud losses.
Register: any account opening in banks, insurance, government agencies, retailers, gaming
sites etc
Account use: any risky action like downloading expensive analyst reports, changing user
details or making a transaction.
Every day’s Headache – How to Accurately identity risk in real time, combining on device
user behavior with device and session risk for detecting Account Opening Risk and
preventing Account Takeover (ATO).
Case Study
Protecting Digital Users –
Banking/Insurance/Retail/Gvt
IBM Security Trusteer is a family of cloud services and endpoint device software that helps assess risk, detect fraud,
establish identity and authenticate users.
• A part of the IBM Security portfolio.
https://www.ibm.com/trusteer 14
Online Fraud Protection – Threat
Intelligence Sources
~120 billion 600 millions 220 million Mobile 350,000 100,000
events per month protected identities devices malware samples phishing sites
16
Solution Portfolio
Malicious
Behavior Device Network Account Intelligence Transactions Access
Tooling
• Compromised • Device ID • Location • Web & Mobile • New Device • Known Bad • New Payee • Failed Login
Credentials Malware Device
• Compromised • ISP / Carrier • Dormant • Risky Payee • Failed Auth
• Behavioral Device • Virtual Account • Phone
• Hosting • Transaction • Mutlipe
Biometrics Machines Number
• Abnormal Service • Associated Anomaly Attempts
• Multi-step Attributes • Emulators Devices • Risky IPs
• VPN • Country Risk • Velocity
Attack
• Spoofed Device • Screen Overlays • Phishing
• Call In • Auth Renewal
• Cross-Channel
Progress • Remote Access • Block Lists
• Navigation Flow
• Non-Human
(BOT)
Full Protection !!
Account
Open Account Account Login Activities Transactions
Example: How does it work?
Login Browse Action
Web User
Visible
Mobile
User
Real time
User Profiling
• Geo Location • Abnormal behavior
• Behavior • Fraud patterns • Allow
• Malware • … • Step-up
• Network • Restrict
• ... • Deny
Consortium
20
IBM Security Trusteer @ 2023
The power of Strong US Alert Distribution of Session Risk Reason
Analytics 3%
3%
2%
19%
Access from a known fraudster device
3%
Unusual access using suspicious device attributes
4%
Suspicious access using a Virtual Machine
21
Threat Research
Lab
Threat
Engineers
Security Reverse
Developers Engineers
Phishing Mobile
Analysts Researchers
Data Web
Scientists Researchers
Fraud
Analysts
22
Case Management & Auto-Response
23
▪ Adoption of an integrated and business-wide
approach to cyber security
Cybersecurity ▪ A collaborative Cybersecurity Strategy involving all
Strategy
stakeholders.
▪ Make the end-user the first line of defense
A proactive approach ▪ IT as a strategic function – ITSM / ITIL
to preventing Cyber ▪ Develop and operationalise Cybersecurity
policy
attacks
▪ BYOD policy
▪ Disaster Recovery Plan
▪ Cybersecurity Incident Response Teams
▪ Auditing and enforcement of cybersecurity
compliance
Never Trust, Always Verify
Questions
Thank You!!
[email protected]
[email protected]
+263713385554
DARKWEB INVESTIGATION
By Fanwell Sibanda
+263773868314
DARK WEB
• The Dark Web is the World Wide Web content that exists on darknets, overlay networks that use the
Internet but require specific software, configurations, or authorization to access. The dark web forms a
small part of the deep Web, the part of the Web not indexed by web search engines, although sometimes
the term deep Web is mistakenly used to refer specifically to the Dark Web.
• Onion Routing
Onion routing is one of the most common networking methods used to create Darknets and Dark Webs. Onion
routing is a technique for anonymous communication over a computer network. In an onion network,
messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is
transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer,
uncovering the data's next destination. When the final layer is decrypted, the message arrives at its
destination. The sender remains anonymous because each intermediary knows only the location of the
immediately preceding and following nodes. There are methods to break the anonymity of this technique, e.g.
timing analysis.
Common Darknet Protocols
• Tor Project
• The Invisible Internet Project (I2P)
• Freenet
• ZeroNet
Anonymity
• For example Many people don't want the things they say online to be connected with their offline
identities. They may be concerned about political or economic retribution, harassment, or even
threats to their lives. Whistleblowers report news that companies and governments would prefer
to suppress; human rights workers struggle against repressive governments; parents try to create
a safe way for children to explore; victims of domestic violence attempt to rebuild their lives
where abusers cannot follow.
• If the suspect sees traffic coming from your investigation system, they may alter their activity,
start an aggressive cyber-attack, or even destroy evidence. This is one of the most important
things to consider when doing cyber investigations. Especially when investigating systems within
the Dark Web.
Types of VPN Services
• HotspotShield
• Nord VPN
• ProtonVPN
• SurfSharkVPN
• VyprVPN
Cont`
• It has long been believed that IP addresses and Cookies are the only
reliable digital fingerprints used to track people online. But after a while,
things got out of hand when modern web technologies allowed interested
organizations to use new ways to identify and track users without their
knowledge and with no way to avoid it.
• Browser Leaks is all about browsing privacy and web browser
fingerprinting. Here you will find a gallery of web technologies security
testing tools that will show you what kind of personal identity data can be
leaked, and how to protect yourself from this." - browserleaks.com
• Acquisition
Acquisition is the execution of the Acquisition Plan created during the Identification phase. The goal of the acquisition phase is to obtain forensic copies of all digital
data that will be required during the analysis phase. This digital data includes both snapshot and live datasets as needed. All snapshot data sources are seized or
forensically imaged and live data is acquired in a notarized manner. Acquisition phase should conclude with a successful completion of the Acquisition Plan. All digital
data necessary for Analysis should be readily available.
• Analysis
Analysis is the phase in which acquired data becomes digital evidence. Aggregation, correlation, filtering, transformation and meta-data generation are the key
components through which data is analyzed. The way in which the examiner interacts with data will determine if the resulting findings are forensically sound and as
such can be accepted as digital evidence. Analysis phase should conclude with a set of digital evidence enough to cover the needs defined on the Identification phase.
• Presentation
Presentation will involve creating a final report to present the digital evidence obtained and supporting a liturgical process if needed. This report must be a self
contained, self explanatory written document in which all relevant actions taken during the Identification, Acquisition and Analysis phases are reflected. Digital
evidence should be presented along with all the needed detail necessary for an independent examiner to reproduce and validate such piece of evidence. Optionally, a
report can include other sets of information as a copy of the evidence or specific subsets of the data analyzed.
Report
Key things to keep in mind when writing a report.
For example
• juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion
• asap2u4pvplnkzl7ecle45wajojnftja45wvovl3jrvhangeyq67ziid.onion
Cryptocurrency
• A cryptocurrency (or cryptocurrency) is a digital asset designed to
work as a medium of exchange that uses strong cryptography to
secure financial transactions, control the creation of additional units,
and verify the transfer of assets. Cryptocurrencies use decentralized
control instead of centralized digital currency and central banking
systems.
Tracking cryptocurrency transactions during an investigation
can have significant evidentiary value for several reasons:
• Identifying suspects: Tracking cryptocurrency transactions can be used to identify suspects involved in illegal activities. For example, by
analyzing the transaction history of a certain cryptocurrency address, it is possible to identify the individual or group that controls it.
• Establishing financial connections: Cryptocurrency transactions can be used to establish financial connections between suspects, for
example, by tracing the flow of funds from one address to another, investigators can determine if suspects are working together or if funds
are being laundered.
• Determining the scope of illegal activities: By tracking cryptocurrency transactions, investigators can determine the scope of illegal
activities. For example, by analyzing the volume of transactions and the amounts involved, investigators can determine if a suspect is
involved in large-scale criminal activities.
• Proving intent: Cryptocurrency transactions can be used to prove intent in an investigation. For example, by analyzing the timing of
transactions, investigators can determine if a suspect intended to engage in illegal activities or if the suspect had knowledge of the illegal
nature of their actions.
• Identifying assets: Cryptocurrency transactions can be used to identify assets. For example, by analyzing the transaction history of a certain
cryptocurrency address, it is possible to identify assets, such as property or other investments, controlled by a suspect.
• Providing Digital Evidence: Cryptocurrency transactions can be considered digital evidence, as the blockchain technology that supports
most of the cryptocurrencies creates a decentralized, transparent and immutable ledgers, providing a clear and verifiable record of all the
transactions, making it a reliable and admissible evidence in a court of law.
Cont`
Bitcoin Transactions Can Be Tracked?
• Privacy coins such as Zcash and Monero may serve up problems for
blockchain analysts, however. Zcash & monero uses a technology
called “zn-SNARKS” to hide transaction data, including the sender,
recipient, and amount transacted.
Practical example- demonstration
• Identify three usernames on Dark Market sites selling drugs "Person
of Interest." Document the "products" they are selling, rating if
available, and any forum posts they may have.
mlyusr6htlxsyc7t2f4z53wdxh3win7q3qpxcrbam6jf3dmua7tnzuyd.onion
(darkmarket)
darknetlidvrsli6iso7my54rjayjursyw637aypb6qambkoepmyq2yd.onion/
markets
Soc puppet Accounts
• https://www.fakenamegenerator.com
Dark Web Email Services
• TorBox – Web based email you can only access through Tor
• Type
torbox36ijlcevujx7mjb4oiusvwgvmue7jfn2cvutwa6kl6to3uyqad.onion
Secure Email Services
• ProtonMail is incorporated in Switzerland and all our servers are located in
Switzerland. This means all user data is protected by strict Swiss privacy
laws.
• All emails are secured automatically with end-to-end encryption. This
means even we cannot decrypt and read your emails. As a result, your
encrypted emails cannot be shared with third parties.
• No personal information is required to create your secure email account.
By default, we do not keep any IP logs that can be linked to your
anonymous email account. Your privacy comes first.
https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/
Secure Drop
• is an open source whistle-blower submission system that media
organizations and NGOs can install to securely accept documents from
anonymous sources. It was originally created by the late Aaron Swartz and
is now managed by Freedom of the Press Foundation. Secure Drop is
available in 20 languages.”
• cy6wj77vryhcyh6go576hxycjz4wxlo4s5vevdinkw3armwzty5jozyd.onion
• xp44cagis447k3lpb4wwhcqukix6cgqokbuys24vmxmbzmaq2gjvc2yd.onion
Other Darkweb Link
• V3 Dark Markets
• ASAP Market: https://asap2u4pvplnkzl7ecle45wajojnftja45wvovl3jrvhangeyq67ziid.onion
• Aurora Market: http://aurora7t7en7racqbytspft6myxds25hnczjk56tvqev2bziir74t4yd.onion
• Dark0de: http://darkoddrkj3gqz7ke7nyjfkh7o72hlvr44uz5zl2xrapna4tribuorqd.onion
• Daeva Market: http://77o4j55bt7e53jrso2nuaumj24cory5weaqv7zypbptkxhdfgaxgfvyd.onion
• Dark Leak Market: http://54rdhzjzc4ids4u4wata4zr4ywfon5wpz2ml4q3avelgadpvmdal2vqd.onion
• Duck CVV: http://duckcvvpi4m4s2wyy423nu3wpn6rdvnsm623azwx2cwf6s3fzcutqiid.onion
• Express Pharma: http://xpreen4gwuqhyuraoojs3ca6345gvbtwrusjqmnustgbs7ckikr2mpyd.onion
• Potluck: http://potluckkh2a4nco2imsrxh3yxbgiezggkhu3sc3zuwrxpkrmlpeze2ad.onion
• Smokers Co: http://pt2mftbxeczbzufi2v7b3ekmsun4khq6hi7bdjo7w23fsx3easvr73ad.onion
• Steroid Warehouse: http://swgoodstau5oxhmlopb5m4ti3vmzeh5fhpdn5spmh36npq76ksgupmad.onion
• Tom and Jerry: http://tomjerr2cwoo2icmq2ijvmao2bjkawhtw2c7n6vmzqzomkyqea2o5dqd.onion
• Tor Market: http://rrlm2f22lpqgfhyydqkxxzv6snwo5qvc2krjt2q557l7z4te7fsvhbid.onion
• The Grass Company: http://grass7kk5kkgj7kzfl3m5ln4sljxardcednhjrhwvevt3ztivlzd6wad.onion
• Vice City: http://vice2e3gr3pmaikukidllstulxvkb7a247gkguihzvyk3gqwdpolqead.onion
Any Questions
• Thank you!
Intelligence
SLIDESMANIA.COM
Malware Analyst
Researcher
SLIDESMANIA.COM
Generative AI and Certifications
■ Introduction to AI
Descript- filler word removal, Clone your voice using overdubbing, transforms
low-quality recordings to studio sound.
Tools: EnCase,Volatility,FireEye
SLIDESMANIA.COM
Incident responders: Certifications
Certified Incident Handler (GCIH)
Lorem ipsum dolor Lorem ipsum dolor Lorem ipsum dolor Lorem ipsum dolor Lorem ipsum dolor
sit amet, sit amet, sit amet, sit amet, sit amet,
consectetuer consectetuer consectetuer consectetuer consectetuer
adipiscing elit. adipiscing elit. adipiscing elit. adipiscing elit. adipiscing elit.
SLIDESMANIA.COM
Presenting a website?
If you are presenting a website, an internet product or an app, you can place a
SLIDESMANIA.COM
screenshot of it here.
Presenting a website?
If you are presenting a website, an internet product or an app, you can place a
SLIDESMANIA.COM
screenshot of it here.
Presenting an app?
If you are presenting a website, an internet product or an app, you can place a
SLIDESMANIA.COM
screenshot of it here.
Presenting an app?
If you are presenting a website, an internet product or an app, you can place a
SLIDESMANIA.COM
screenshot of it here.
Credits.
Presentation Template: SlidesMania
Images: Unsplash
Sharing is caring!
NOT to be sold as is or modified!
Read FAQ on slidesmania.com
SLIDESMANIA.COM
This report is solely for the use at CRS presentation. No part of it may be circulated, quoted, or reproduced for distribution outside the client organization
without prior written approval from MorniPac Consultants This material was used by MorniPac Consultants during an oral presentation; it is not a complete
record of the discussion. 1
BOARD COMMITTEE
ICT SECURITY
IDEAL STRUCTURE
CEO
ICT EXECUTIVE
CHIEF INFORMATON
&
SECURITY OFFICER
DIGITAL STRATEGY
JFM 3
Agenda
1.Economic crime
JFM 4
Economic crime
• Economic crime refers to illegal acts committed by an individual or
group of individuals to obtain a financial advantage.
JFM 5
ECONOMIC CRIME
JFM 6
FRAUD
JFM 7
Fraud cntd
Businesses and governments suffer from various forms of fraud. This
fraud can be defined as:
• Occupational fraud- fraud perpetrated by those who are employed by
the organisations they defraud
JFM 8
The cost of fraud
• Fraud is endemic today and it is a major cost to :
• Business
• Society
• Governments and
• Individuals
JFM 9
ACCOUNTANTS AND CYBER CRIME
JFM 12
THE FRAUD TRIANGLE
Opportunity Pressure
Rationalization
JFM 13
The Fraud triangle- Pressure
External pressures:
-Debt
-Greed
-Lifestyle pressures
Internal pressures:
-Pressure to perform
JFM 14
The Fraud triangle- Opportunity
Internal controls:
-Not in place
-Not enforced
-Not monitored
-Not effective
No segregation of duties
JFM 15
Fraud triangle- Rationalization
-If they don’t know I am doing it they deserve to lose the money
JFM 16
Fraud diamond
Rationalization
Opportunity
Pressure
Capability
JFM 17
FRAUD DIAMOND
In addition to the three elements a fourth element can also be added.
-This element has to be there if the fraud must take place.
-This element is capability.
-The theory says , in addition to the three elements being present, fraud
would still not take place if the would-be perpetrator has no capacity to
pull it off.
JFM 18
THE FRAUD PENTAGON
Opportunity Rationalization
Pressure Capability
arrogance
JFM 19
THE FRAUD PENTAGON
-It depicts the way that the person thinks he can get away with it.
-The person thinks he has the capacity to cheat and not be caught.
JFM 20
FRAUD PREVENTION
JFM 21
Fraud prevention
• One of the key ways to prevent fraud is to pay attention to the red
flags.
JFM 22
Whistleblowing
• Whistleblowing is one of the most used methods of detecting and
preventing fraud.
• The wrong doing is usually, but not always, what one would have
witnessed.
JFM 23
ACCOUNTING AND AUDITING
• Accounting and auditing are important in the prevention of fraud.
JFM 24
ADVANTAGES OF AUDIT
• Assurance to stakeholders
• Fair evaluation
• Fraud identification
• Moral policing
• Credibility
• Overall improvement
• Compliance
• Helps in building a good reputation
JFM 25
CHALLENGES FACED BY AUDITORS
• Revenue recognition
• Fraud
• Inventory inaccuracy
• Information delays
• Talent retention & development
• Job stress
• Outdated skills
JFM 26
ACCOUNTING AND FRAUD PREVENTION
JFM 28
AGILE AUDITING
o Agile auditing is mainly used in internal auditing.
o It is used to develop an audit plan that is able to respond to change.
Change could be a result of new risks emerging or business priorities
changing.
o Example: Internal auditors can focus on the highest priority risks
giving it all the attention- when that sprint is completed the auditor can
now look at the backlog of tasks that relate to the other risks.
JFM 29
ADVANTAGES OF AGILE AUDITNG
JFM 30
Disadvantages of agile methodology
• Less predictable
• More time and commitment
• Greater demands on developers and clients
• Lack of necessary documentation
• Projects easily fall of track
JFM 31
DIFFERENCES BETWEEN AGILE AND TRADITIONAL
METHODS
• Agile internal audit focuses on value and not audit objectives
JFM 32
Fraud investigation
• Once fraud has occurred and been detected, it must be investigated.
• Taking action publicly helps to show zero tolerance of fraud and helps
in preventing future frauds
JFM 33
Fraud investigation
• To effectively investigate, one must create a fraud investigation model.
• The model will give you a structure to follow when dealing with allegations
of fraud
• The model will influence the fraud investigation plan .
JFM 34
Fraud investigation
Components of the Fraud investigation plan include:
• Summary of the complaint
• Legal theories
• Investigations strategy and expected sources of evidence
• Required resources
• Milestones and timelines
• Expected report dates.
JFM 35
Components of a Typical Fraud
investigation Plan
Defining the objective & Crystallization of the terms of reference
Evaluation of Evidence
Reporting
JFM 36
Fraud investigation process
• Fraud investigation examines the evidence to determine whether or
not a fraud occurred, how it occurred, who was involved and the
value of the loss.
• The theory approach can be used in investigating allegations.
• The approach is based on:
-analyzing the data
-Creating a hypothesis,
-testing the hypothesis and
-refining the hypothesis
JFM 37
Principles of internal investigations
2. Do not pre-judge
5. Investigate promptly
JFM 39
EXPERT WITNESS
• Sometimes your investigations will result in you being asked to be an
expert business in court
• An expert witness is anyone with :
• Knowledge
• Experience and
• Authority
• In, or of a particular discipline beyond that of a layman
• Affiliation with a reputable organisation is also considered as
important for an expert witness
JFM 40
DUTY OF EXPERT WITNESS
• The expert witness’s duty is to give the trier of fact an impartial
expert opinion on particular aspects within his or her area of
expertise.
The expert witness should:
• Be truthful as to fact
• Thorough in technical reasoning
• Provide his honest opinion and
• Ensure that the report is complete
JFM 41
CHARACTERISTICS OF EXPERT WITNESS
• Clear communication- witness can succinctly explain complex topics
• Confidence- witness should have the ability to overcome a difficult situation confidently
• Candor- witness is candid and can fairly assess the merits of a case
JFM 42
SUCCESS FACTORS AS AN EXPERT WITNESS
• Expert witness must be qualified
JFM 43
THANK YOU
JFM 44
References
• M Chigondo – MorniPac Training Presentations
• A Vesterinen- Tips on how to manage whistleblowing
cases(2020)
• https://smallbusiness.chron.com
• https://blowthewhistle.com
• W Rukanda – MorniPac Training Presentations
• M Ehlers – basic principles of investigations,2017, Kroll
• International Institute of Certified Forensic Accountants Inc.
USA – (2016) Certified in Fraud and Forensic Accounting
Study Guide JFM 45
OPEN SESSION THANK YOU
JFM 46
CYBER FRAUD SUMMIT
VIC FALLS - 2023
SUMMIT HIGHLIGHTS
The Fifth Industrial Revolution
BIG DATA
Cyber Security
Cyber Safety
Secure Digital Space ( Now and Future )
Zimbabwe ,Sept 2023
[email protected]
This report is solely for the use at CRS presentation. No part of it may be circulated, quoted, or reproduced for distribution outside the client organization
without prior written approval from MorniPac Consultants This material was used 1 by MorniPac Consultants during an oral presentation; it is not a complete
record of the discussion.
Nuggets & Reminders
3
• Major Assignments Employment Experience
•Qualifications ( Whisper Rukanda ( PhD )) • Bank Launch ∙MorniPac – Chief Operating Officer ( Retail,
•Diplomas + 8 ( Management, Leadership, Supervisory ) • Retail Set-up Telecoms, Banking and SOEs)
•Higher Diploma in Computer Science • 10 Key Systems ∙Barclays Bank Africa – Program Manager /
• Forensic Auditing Technical Delivery Consultant
•Bachelor of Business Studies Honours - UZ • VAPT and Revenue Assurance ∙MorniPac Consultants – Executive Consultant/
•Masters in Business Leadership - Unisa • Governments / State Advisory, NGOs Projects Executive
•Masters of Science in Information Systems & Technology – Professional Affiliations ∙Standard Bank Africa – Business Consultant /
Technion Israel • Forensic Society – USA Business Systems Interfaces
• Certified Forensic Examiner – Oxygen Forensics ∙Bluequest International – Regional Director
•Master of Science in Managing Complex Projects – MIT Boston
• Member of PMI – UK institute of Project ∙Plus Financial Holdings – Executive Director
•Doctorate in Information Systems & Technology, Information Management (Business & ICT Strategy)
Technology – Rocklands, USA • Member of the OWASP Center for Vulnerability ∙eTranzact Zimbabwe – Managing Director
•Certifications Assessment ∙Kingdom Bank – Group Projects Head /
•Certified Forensic Investigator (Paraben Commander II) USA • Associate of the Certified Ethical Hackers Institute. General Manager ICT
• Member of Computer Society of South Africa ∙Chemplex Corporation – Group MIS Manager
•Paraben Certified Mobile Examiner ( PCME ) • Associate Member – Computer Society of and Old Mutual PC Specialist
•Paraben Certified Forensic Examiner ( PCFE ) Zimbabwe
•Certified Project Manager – PMI UK
•Certified Digital Forensic Expert (CDFE) - USA Publications
•Certified Information Security Auditor (CISA) - USA ∙Leading Knowledge Management – Using information technology services for organizational benefit in
•Certified Ethical Hacker (CEH) – USA times of extreme uncertainty – PhD Thesis
• Certified Fraud Auditor (CFA) – IIAFA- USA ∙Using technology to Bring Service to the People - Masters in Business Leadership
∙Streamlining Supply Chain Management with Business to Business Marketing: A study focusing on
•Licensed Penetration Tester
advancing delivery by reducing leaks in addition to shrinkages and harnessing links, integration and
•Certified Forensic Examiner ( CFE ) relationships – MSc Information Systems and Technology
• Accredited Real Facilitator – REAL CONSULTING RSA ∙Strategic Information Systems Management – Selected Text for ICSAZ Computing Course
∙Dynamics of ICT – A case study of the Zimbabwean ICT environment 2010
∙Youth Guide – A Guide to Youth development and Growth in an extremely uncertain environment
∙Leadership Development Manual and Handbook – 2009
∙ICSAZ – Strategic Information Technology Handbook and Publication – ICSAZ – Dynamics of ICT –
Vic Falls – Zimbabwe 2010
∙Project Management Handbook for ICT and Business Projects.
Technology owes ecology
an apology
• “Fraud prevention and
detection is like a
mortal’s need for air.
When it’s present, it’s
never noticed. When it’s
missing, it’s all that’s
noticed”
• Author: Unknown
https://the-dark-web.com/dark-web-links/
osforensics download
SOCIETY
NATURE
We need to create a
techno-socio-economic-ecological knowledge
accelerator - a kind of multi-disciplinary Apollo
project that uses current and future ICT
developments to address the challenges of
12
Using the Internet
Strategically
HIG
Customer connectivity / competition /
H
Product and
Global Market
Service
External Drivers
Penetration
Transformation
technology
Performance
Cost and
Improvement in
Efficiency
Business
Improvements
Effectiveness
LOW collaboration / information and HIG
applications H
requirements / cost containment
Internal Drivers
ICT Review, health check ( VAPT )
and Ascertainability Assessment
Macro Solution Scope – E.G banking system
Volumes Core Banking Key Systems Description
Ledger & Product Pricing Customer Limits & Role Based SWIFT Alliance
Base Services Accounting Rules
Intermediary
Information File Collaterals
Clearing
Security Oracle IDM
Connector
Management Operational Customer Data Regulatory
Retail Liabilities Retail Assets Standard Operational Reporting System
Reporting Reports Reports Reporting
Statements Extracts
Regulatory Reporting Interface
Data Mart Data Mart Reports
Information Server Base BAM Dashboards Advices & Alerts Tax Reporting
FCUBS Required FCUBS Not Required FCUBS Base Module Standard Shared Solutions
Module 1: Introduction
Module 2: Computer Forensic Incidents
Module 3: Investigation Process
Module 4: Disk Storage Concepts
Module 5: Digital Acquisition & Analysis
Module 6: Forensic Examination Protocols
Module 7: Digital Evidence Protocols
Module 8: Computer Forensics Investigative Theory DIGITAL FORENSICS
Module 9: Digital Evidence Presentation
Module 10: Computer Forensic Laboratory Protocols
Module 11: Computer Forensic Processing Techniques
23 – 27 October 2023
Module 12: Digital Forensics Reporting CERTIFICATION TRAINING
Module 13: Specialized Artifact Recovery
Module 14: e-Discovery and ESI
We also Certify
Module 15: Mobile Device Forensics DIGITAL FORENSIC EXAMINER
Module 16: USB Forensics DIGITAL FORENSIC SPECIALIST
Module 17: Incident Handling DIGITAL FORENSIC ANALYST
DIGITAL FORENSIC EXPERT
Some Key ICT Security Challenges
• There is no end to end monitoring( eg: OS, Network, Database, Data)
• No user monitoring of who is doing what?
• Absence of enabled ICT Audit
• Absence of control on the data copying and stealing from database/server
• No alert on suspicious activity ( Exceptional Logs not Reviewed )
• No control on user actions VS details given on change/incident systems
• No automated password rotation ( Dept may use same password )
• No firewall restriction/Any one can login from any server
• No view on who has access to which server Compliance / Risk control
• There is need for Data Cleansing
• ICT Resources not Certified in area of work assigned.
Some Key ICT Security Challenges
• Most Policies are Not Signed and Adopted
• Some Policies, Rules, Procedures, Standards and
Guidelines Still under Development
• No Signed Data Policy
• No Incident Response Team or BCP
• No comprehensive UAP
• Policies not operationalised ( no DR Servers )
• Data not clean
• No Staff Skills Matrix and Career Dev, Plans
• No Segregation of Duties
COMMON KEY SERVICE PROVIDERS SHORTCOMINGS
ERP system NOT integrated
- No standards and certifications
- Licensing Expiry ( Pirated Software Used )
- Human Resource Skilling ( No SMEs )
- Systems Integration (Departmental Silo of Systems )
- Vendor Management ( Unsystematic, No profiling, no Rating)
- BANKS Too Manual
- Data in bad state ( Data need Cleansing)
- ICT Upskilling / Development plan absent
- Poor Project Management or no Methodology
- No Business Continuity / DRP Sites
- No Digital Transformation Strategy
Digital Forensics and Other
Related Disciplines
• Forensics investigators often work as part of a
team, known as the investigations triad
24
3 Eras of Fraudulent Activities
• Paleolithic Era
• Centered on cash and evading taxes
• Fraud schemes involved alcohol, gambling, prostitution and drugs
• Neolithic Era
• “Accountants could steal more than mobsters”
• Included cash heavy business to conceal proceeds
• Geek-olithic Era
• Computers or network of computers involved
Money
Power
Control
Publicity
Revenge
Crackers
Learning ,
Future protection/Penetration
testing
Or Just to do it!
26
Cyber Power
Cyber power ( IR4 to Industry 5.0 )
At the heart of strategy should be the concept of cyber power, which can be
defined as the ability of a state to protect and promote its interests in and
through cyberspace. There are 5 broad dimensions of cyber power which align
to the pillars of this strategy
1. The people, knowledge, skills, structures and partnerships
2. The ability to protect our assets through cyber security and resilience
3. The technical and industrial
4. The global influence, relationships and ethical standards
5. The ability to take action in and through cyberspace to support
national security, economic wellbeing and crime prevention. - laws
• Cyber-enabled financial crime is a smaller subset of cybercrime and includes crimes with a financial end-goal: ransomware, sextortion schemes, identity theft, money
laundering, etc.
• There are some types of cybercrime, such as the theft of intellectual property that are trickier to categorize.
• • FC may involve fraud (credit card fraud, corporate fraud, securities fraud (including insider trading), bank fraud, payment (point of sale) fraud etc.); theft; scams or
confidence tricks; tax evasion; identity theft; money laundering; and counterfeiting, including the production of Counterfeit money and consumer goods.
• Current cybercrime and fraud defenses are focused on point controls or silos but are not based on an understanding of how criminals actually behave. For example, if banks
improve defenses around technology, crime will migrate elsewhere—to call centers, branches, or customers.
Reasons for doing Cyber Crime
• Fame
• Reputation for Intelligence
• Financial
• Revenge on someone they hate
• Protest
• Pursue criminal activities
• Steal identity
Cyber Crime
m e Cy
Cyber Security
• Virtual
• The part of cyberspace most people experience. It consists of representations of people and organisations through a virtual identity
in a shared virtual space.
• Virtual representations could be an email address, user identification, a social media account or an alias. One person or one
organisation can have multiple identities online. Conversely, multiple people or organisations could also create just a single, shared
identity.
• Digital investigations
• Manages investigations and conducts forensics
analysis of systems suspected of containing evidence
38
Preparing for Digital
Investigations
• Digital
investigations
fall into two
categories:
• Public-sector
investigations
• Private-sector
investigations
39
Following Legal
Processes
• Digital Evidence First Responder (DEFR)
• Arrives on an incident scene, assesses the situation,
and takes precautions to acquire and preserve
evidence ( 6 S of Crime Scene )
• Chain of custody
• Route the evidence takes from the time you find it
until the case is closed or goes to court
Detect Correct
GProcess
Delete
Prevention
(Investigation) Distract Defer
Detect
GProcess
Delete Distract /
Defer
49
Back Tracing
• Elements of a back trace
• end points
• intermediate systems
• e-mail and packet headers
• logs
DIAL
INTERNET
ATTACK VICTIM
Obtaining Subpoenas
• Notify involved organization that you are going to
subpoena and request that they preserve evidence -
find out who to deliver the subpoena to
• Must be complete
• All superuser access
• Login and logout
• Attempts to use any controlled services
• Attempts to access critical resources
• E-mail details
• Appropriate retention
Tracing E-Mail Headers
(3) Received: from mailhost.example.com
([XXX.XXX.178.66])
by smtp.exampl.com; Sat, 12 Sep 1998 15:25:54 -0700
(2) Received: from web03.iname.net by mailhost.example.com (AIX 3.2/UCB
5.64/4.03) id AA07400; Sat, 12 Sep 1998 15:31:55 -0700
(1) Received: (from root@localhost) by web03.iname.net (8.8.8/8.8.0) id
SAA29949; Sat, 12 Sep 1998 18:25:13 -0400 (EDT)
Date: Sat, 12 Sep 1998 18:25:13 -0400 (EDT)
(4) From: fake user [email protected]
Message-Id: <[email protected]>
Content-Type: text/plain
Mime-Version: 1.0
To: [email protected]
Content-Transfer-Encoding: 7bit
Subject: This is a forged e-mail message
Performing the Trace
Contact iname’s
Security Officer Connect account name,
time, & message ID to
source IP address
• Forensic analysis
• NTI tools
64
65
Fraud Triangle
CHANNELS
FCR
B.NET C2B BIR
ATM Auto
NPC Modbank Call Record BAT Party
Refund
BOC
BIR SME MSCRM Knowledge CC Perf Vodafone
BFG BARX IVR EBC Base Mgmt
Payroll FCUBS
CUSTOME
Modbank BOC
R MGMT
SERVICE
SALES &
SCV ASSETS
Connected Automated
SCV Telesales Tracking
Accounts FCR BOC MSCRM BOC Manager System
SCV LIABILITIES
1 Africa DW
PRODUCTS &
SERVICES
IBM Data Power Informatica BNE GEFU Control BBE File Utility BBE Short
BEM (ESB) (API Mgmt) (ETL) CRSA System Handler Message Service
(Notifications)
INTEGRATION
69
RED FLAGS
- BUSINESS
- ICT
RED FLAGS
Is he or she spending a lot of secretive
time on the computer? Our Computer
Forensic Investigators can find out what
they are hiding...
Is your employee
acting strange with
what they are doing
on the company's
computer or Cell
Phone? Let our
Dallas Corporate
digital forensic
investigator find out
what is really going
on by finding hidden
files, passwords and
much more.
Don't let the skeletons taunt you DFW. Find
out what they are hiding by contacting our
Computer Forensic Investigator TODAY!...
Is your employee doing
things they shouldn't on
company time and
property? Our digital
Forensic Investigators
agency can find out what
The PI suggested I run they are hiding... and
a cell/mobile phone provide you with evidence
forensic analysis on my so you can make a sound
husbands last business decision
generation phone ....
Don't let technology
(phones, PDA's,
computers, etc...) control
your life... take charge and
find out what is being
hidden from you today
Business RED Flags
Management override.
Irregular & poorly explained management activities.
Delays and problems in obtaining requested information.
Significant, unusual & unexplained changes in customers or suppliers.
Manager performing clerical duties.
Poor system access controls
Repeatedly exceeding estimates & budgets.
Weak Control Environment
Key Monitoring controls ignored
Bank reconciliations
Creditors reconciliations
Debtors reconciliations
Backlog in posting transactions to the system
Integrated systems not talking to each other
Intercompany accounts not being reconciled
Poor Internal control system
Clearing accounts/ Suspense accounts accumulating balances
Personal RED Flags
Living beyond their means.
Disgruntled / frustrated with their job.
Unusually close association with suppliers.
Severe personal financial losses.
Addiction – drugs, alcohol, gambling, etc…
Unexplained change in personal circumstances
(e.g. recent purchase of latest Mercedes on a monthly salary of
$1,000).
Rarely, or only takes VERY short, vacations.
Procurement Fraud
The basic acquisition and expenditure activities are:
— Purchasing goods and services, and
— Paying the bills
Effective Ethics and Compliance
Program
2. Rounded-amount invoices.
4. Abnormal invoice volume activity (two invoices one month and 60 the next).
C. Warner and B. G. Dubinsky, “Uncovering Accounts Payable Fraud,” Fraud Magazine, July/ August
2006, pp. 29-51.
9/20/2023 4
Top Cybersecurity Frameworks for
Financial Institutions
NIST Cybersecurity Framework (NIST CSF)
• The NIST Cybersecurity Framework was developed by NIST, the US
Department of Commerce’s National Institute of Standards and
Technology, which supports US innovation through industrial
competitiveness via several strategies, including developing measurable
cybersecurity standards to protect critical infrastructure and
enhance information security and data protection activities.
• NIST CSF is a popular cybersecurity framework containing a set of
standards, guidelines, and best practices to help businesses get their
basic cybersecurity processes up to speed and have a baseline to develop
their IT infrastructure. NIST frequently updates the framework, keeping it
relevant as the number of cyber attacks and types of cybersecurity threats
evolve.
9/20/2023 5
The five main pillars of the NIST CSF are:
1. Identify
2. Protect
3. Detect
4. Respond
5. Recover
9/20/2023 6
Center for Internet Security (CIS)
Critical Security Controls
•CIS Benchmarks focuses on securing
the configuration of operating systems,
software, middleware, and network
devices, which is referenced throughout
CIS Controls.
9/20/2023 7
ISO 27001/27002
•ISO is the International Organization for
Standardization, while IEC refers to the
International Electrotechnical Commission.
•The ISO 27000 series are internationally recognized
and the global standard for information
security management.
•The ISO/IEC 27000 family comprises more than a
dozen sets of cybersecurity standards for
information security management systems (ISMS).
9/20/2023 8
Cybersecurity Capability Maturity Model (C2M2)
• Created in 2012, C2M2 was originally part of the US
Department of Energy and cybersecurity experts’ response
to a White House initiative to assess the energy
industry’s security posture.
• However, today, the framework helps organizations of all
sizes and types, and especially financial institutions, evaluate
their cybersecurity postures and maturity to optimize
investments in cyber defense systems and procedures,
focusing on solutions relating to information technology and
operations technology.
9/20/2023 9
Information Technology Infrastructure Library (ITIL)
• The ITIL is a set of best practices relating to managing IT services and
enhancing the quality of IT support. Its primary objective is to ensure that
an organization’s IT services adapt to the evolving objectives of the
business.
The framework comprises 26 processes, divided into five primary stages.
1. Service Strategy - including assessing and measuring IT strategy.
2. Service Design - including creating, managing, and assessing Information
Security services.
3. Service Transition - including risk management related to change.
4. Service Operation - including access management.
5. Continual Service Improvement - which helps organizations keep IT
services aligned with evolving businesses.
9/20/2023 10
Cloud Security Alliance (CSA) Security, Trust &
Assurance Registry (STAR)
• The CSA is the world leader in raising awareness of best practices
relating to cloud computing environments.
• The CSA’s STAR Registry is open to the public. Anyone can see the
security and privacy controls provided by popular cloud computing
service providers.
• Cloud computing organizations that publish to the registry
demonstrate their compliance and security postures, including
information on the regulations, standards, and frameworks with which
they are aligned.
9/20/2023 11
Australian Government Information Security Manual
(ISM)
• Its aim is to establish a cybersecurity framework that
organizations can align with their risk management
frameworks.
Is intended to be used by:
∙ Chief Information Security Officers (CISOs)
∙ Chief Information Officers (CIOs)
∙ Cybersecurity professionals
∙ Information technology (IT) managers
9/20/2023 12
ZIMBABWEAN CONTEXT
•National Payment Systems Risk Based Guideline On
Cybersecurity
•The Risk Based Cyber Security Guideline is issued
pursuant to the National Payment Systems (NPS) Act
(Chapter 24:23)
•This Guideline applies to all institutions licensed under
the National Payment Systems, Banking and any
related Acts under the Reserve Bank of Zimbabwe’s
jurisdiction.
9/20/2023 13
•The Zimbabwean financial services community
has embraced some measures from
organisations such as the Bank for International
Settlement (BIS).
•While the principles and expectations of this
cybersecurity guideline incorporates risk
management areas that are outlined in the 24
Principles for Financial Market Infrastructures
(PFMIs), the Guideline is not intended to replace
or supersede the international best practices.
9/20/2023 14
•In the case where the institutions
cybersecurity operations depart
from the BIS cyber security
guideline, they shall identify and
demonstrate to the Bank, any
identified international best practise
guidelines they would have put in
place.
9/20/2023 15
Cybersecurity in Banking – Value
Chain Analysis
•Cybersecurity in the banking
industry is split into three
segments:
- Hardware
- Software
- Services
9/20/2023 16
Hardware
•With chips now being used in mission-critical servers
and safety-critical applications, protecting chips from
cyberattacks is becoming more critical and more
expensive.
•Systems vendors such as Apple and Amazon are
increasingly designing their chips rather than buying
commercially developed devices and intellectual
property (IP) created by third-party developers.
9/20/2023 17
Software
The software element of the cybersecurity
value chain comprises the following areas:
identity management, network security,
endpoint security, threat detection & response,
cloud security, data security, email security,
application security, unified threat
management, and vulnerability management.
9/20/2023 18
Services
•The services element of the cybersecurity value
chain comprises the following areas: managed
security services, post-breach response
services, and risk & compliance services.
•Services are typically outsourced because of
the complexity of addressing
cybersecurity-related issues, such as staying on
top of vulnerabilities, identifying & responding
to threats,
9/20/2023
and meeting compliance
19
What Is Cybersecurity Compliance?
•Cybersecurity compliance means adhering to
standards and regulatory requirements set forth
by some agency, law or authority group.
•Organizations must achieve compliance by
establishing risk-based controls that protect the
confidentiality, integrity and availability of
information.
•The information must be protected, whether
stored, processed, integrated or transferred.
9/20/2023 20
Why Is Compliance Important in
Cybersecurity?
•No organization is completely immune from
experiencing a cyberattack, meaning that
complying with cybersecurity standards and
regulations is paramount.
•It can be a determining factor in an
organization's ability to reach success, have
smooth operations and maintain security
practices.
9/20/2023 21
Types of Data Subjected to
Cybersecurity Compliance
•Most cybersecurity and data protection
laws revolve around sensitive data,
including three different types:
personally identifiable information (PII),
financial information and protected
health information (PHI).
9/20/2023 22
Benefits of Cybersecurity Compliance
∙ Protects their reputation
∙ Maintains customer or client trust
∙ Builds customer confidence and loyalty
∙ Helps identify, interpret and prepare for
potential data breaches
∙ Improves an organization’s security posture
9/20/2023 23
CYBERSECURITY GOVERNANCE
•Cybersecurity governance is a
comprehensive cybersecurity strategy
that integrates with organizational
operations and prevents the interruption
of activities due to cyber threats or
attacks.
9/20/2023 24
Features of cybersecurity
governance include:
• Accountability frameworks
▪ Decision-making hierarchies
▪ Defined risks related to business objectives
▪ Mitigation plans and strategies
▪ Oversight processes and procedures
9/20/2023 25
•Ensuring oversight structures are in place at
board level is a key feature of cyber
governance.
•As a material risk affecting companies, boards
are increasingly held accountable for ensuring
the executive team is taking appropriate steps
to mitigate the risk of a cybersecurity attack,
and also ensuring the organisation responds
appropriately in the event of an incident.
9/20/2023 26
•Often, boards have little to no experience in
this field, and whilst the dynamic nature of
cyber risk means that board members are not
expected to be cyber experts – though there is
merit to having expertise on the board – they
are expected to be able to challenge
management on this topic and inform
shareholders on the measures in place to
mitigate the impact of cybersecurity incidents.
9/20/2023 27
•Organisations must develop a
culture of cyber resilience.
•Everyone in the organisation should
feel supported to make decisions
that protect the confidentiality,
integrity and availability of
information assets and systems.
9/20/2023 28
•Awareness of and accountability for cyber
resilience should be seen throughout the
organisation as an important and
complementary part of that organisation’s
mission.
•Establishing an organisation’s cyber security
culture occurs from the top down.
•This can be communicated and reinforced
through strategy, policy and standards.
9/20/2023 29
THE ROLE OF INTERNAL AUDIT IN
CYBER SECURITY
• Audit committees and boards have also reacted to the evolving threat.
• They have set an expectation for the IA function to play a key role in
ensuring the organisation is protected against cyberthreats.
• What should IA functions and leaders keep in mind, and how can they
work with CIOs and CFOs to ensure their IT operations are secure?
9/20/2023 30
Key cybersecurity considerations for IA
leaders
Assess cybersecurity risks against goals and strategy
• IA should consider the appropriateness of cybersecurity
frameworks implemented, the appropriateness of
cybersecurity risk management within their organisations,
the appropriateness of the cybersecurity strategy,
cybersecurity governance including the roles and
responsibilities for IT, security, business and third
parties, the effectiveness of IT disaster recovery and
business continuity planning programmes amongst
others.
9/20/2023 31
Conduct risk based cybersecurity
assessments
• IA should focus on the adequacy of the risk
assessments and on key risks identified,
while also ensuring they have a sense of the
threat landscape internally and externally.
These key risks should be included in the
annual audit plan for review.
9/20/2023 32
Assess compliance with cybersecurity
regulations
The regulatory environment continues to
evolve and continues to mandate
cybersecurity requirements that organisations
need to adhere to. There is a greater focus on
cybersecurity by regulatory bodies,
organisations and mainstream media
9/20/2023 33
Determine how operational changes should be
assessed
•IA professionals should focus on familiarising
themselves with changes to their
organisations operating environment and
how this may lead to the increased
cybersecurity risk
9/20/2023 34
Collaborate with other lines of defence
IA should effectively collaborate with first-line
and second-line functions. In doing so, it can
reduce the likelihood of blind spots or
significant cybersecurity issues materialising.
9/20/2023 35
Report and escalate the risks
•IA should ensure that key risks resulting from
cybersecurity assessments are reported as
soon as they are known and should not wait
for full execution of the audit as identified
risk can be exploited by attackers.
9/20/2023 36
Use relevant reference frameworks
• IA should consider existing frameworks when executing
assessments to ensure end to end coverage of cybersecurity
domains.
• Consider whether the organisation has formally adopted an
industry standard, framework or guidelines such as the National
Institute of Standards and Technology cybersecurity framework
(NIST CSF), International Organisation for Standardisation (ISO)
27001 and 27002 amongst others
9/20/2023 37
Report to the board and audit committee
•IA has a crucial role to play in ensuring that the
audit committee and board are fully informed
through provision of valuable current and
emerging cybersecurity insights.
•IA should ensure that the audit committee and
board remains highly engaged with cybersecurity
matters and are up to date on the ever-changing
threat landscape.
9/20/2023 38
“CYBER FRAUD SUMMIT”
CYBER SECURITY | CYBER FINANCIAL CRIME
Detection, Prevention, Investigation, and Reporting
Sprayview Hotel | Victoria Falls| 18 – 22 September 2023
Dr. Whisper Rukanda|+27 73 635 5777 | +263 772 410 555 |
[email protected]
Presentation Objectives
• Insuring Cyber Assets and Evaluations
• Information Security Assests & Certifications
(Cybersecurity hygiene)
• Cyber Risk and Data Protection Insurance
• Cyber Risk Assessment – Tools and Software
• Planning and Conducting Investigations on Cyber
• Commonly ignored exposures that can lead to complex,
high-risk attacks
• Cyber Asset Attack Surface Management (CAASM)
9/19/2023 2
“CYBER FRAUD SUMMIT”
CYBER SECURITY | CYBER FINANCIAL CRIME
Cyber Crime and Cyberattacks
Sprayview Hotel | Victoria Falls| 18 – 22 September 2023
Eng Prudence Kadebu|+263 713385554 | [email protected]
Outline
Cybersecurity
Cybercrime
Cyber Financial Crime
Digital Hijacking
Business Email Compromise
Cyber world and Retail, Rentals and
Telecoms Fraud
Cybercrime
Financial Crime
• Cybercrime
Market Abuse and Insider Trading
Criminals or insider Market manipulation is when a market
for securities is inflated or deflated to
traders manipulate make it appear that securities are
the market rules worth more or less than their true
value.
and regulations and
gain secret • E.g. the issuer of securities gives
information from money to several people it controls
so that those people will acquire
within the entity, the securities fabricate the
using their power of existence of a market for them.
position personal High demand for an asset = High
financial gain. market value
Digital Hijacks
Cyber /Digital hijacking, or computer
hijacking, occurs when an attacker takes
control of computer systems, software
programs, and/or network communications.
• Electronic Account Hijacking- a cybercriminal obtains
personal banking information and uses it to take over
your bank accounts. WhatsApp Account Take-Over
• Domain Hijacking – Through phishing, attackers take
over your control panel and point it to a scam site they
control.
• Ransomware Attacks – Targeted at companies
demanding a ransom as high as $70m. RaaS new norm.
• Browser hijacking is most often used to compel a
victim to click on adverts, change the default browser
settings, or reroute online traffic.
• “the largest and most Beginning in September 2019, the threat actor
first conducted a “dry run,” injecting test code
sophisticated attack the world into SolarWinds’ network management and
has ever seen,” Microsoft Corp monitoring suite of products called Orion.
Study:
later included in SolarWinds’ Orion software
up to 18,000 SolarWinds updates.
customers that used the
Solarwinds company’s Orion network
monitoring software SolarWinds released the software updates to its
Corp
customers not realizing that the updates were
compromised.
• hackers got access to emails at
Attack the U.S. Treasury, Justice and
Commerce departments and The trojanized code had provided the threat
actor with a “backdoor”—a program that can
other agencies give an intruder remote access to an infected
computer.
• Microsoft and many U.S.
Government Agencies. The threat actor was then able to remotely
exploit the networks and systems of SolarWinds’
• cyber hijacking since the hackers customers who had downloaded the
compromised software updates using a
took control of Orion’s software sophisticated computing infrastructure.
compilation process to include a
backdoor in authentic, software
updates.
https://www.gao.gov/blog/solarwinds-cyberattack-demands-significant-federal-and-private-sector-response-infographic
Business email
compromise
issues
• A damaging form of cybercrime, with the potential
to cost a company millions of dollars.
• A form of phishing scam.
• Attackers often impersonate a trusted person or
entity like an executive, vendor, brand, or internal
system to fool a victim.
• BEC losses involving cryptocurrency rank highest.
• Look out for these forms of BEC:
• Urgent payment required scams
• Gift cards and wire transfers
• Credential compromise scams
Prevention tactics and safeguards to educate
and mitigate risk of business email compromise
Businesses aim to provide the best user experience while reducing fraud losses.
Register: any account opening in banks, insurance, government agencies, retailers, gaming
sites etc
Account use: any risky action like downloading expensive analyst reports, changing user
details or making a transaction.
Every day’s Headache – How to Accurately identity risk in real time, combining on device
user behavior with device and session risk for detecting Account Opening Risk and
preventing Account Takeover (ATO).
Case Study
Protecting Digital Users –
Banking/Insurance/Retail/Gvt
IBM Security Trusteer is a family of cloud services and endpoint device software that helps assess risk, detect fraud,
establish identity and authenticate users.
• A part of the IBM Security portfolio.
https://www.ibm.com/trusteer 14
Online Fraud Protection – Threat
Intelligence Sources
~120 billion 600 millions 220 million Mobile 350,000 100,000
events per month protected identities devices malware samples phishing sites
16
Solution Portfolio
Malicious
Behavior Device Network Account Intelligence Transactions Access
Tooling
• Compromised • Device ID • Location • Web & Mobile • New Device • Known Bad • New Payee • Failed Login
Credentials Malware Device
• Compromised • ISP / Carrier • Dormant • Risky Payee • Failed Auth
• Behavioral Device • Virtual Account • Phone
• Hosting • Transaction • Mutlipe
Biometrics Machines Number
• Abnormal Service • Associated Anomaly Attempts
• Multi-step Attributes • Emulators Devices • Risky IPs
• VPN • Country Risk • Velocity
Attack
• Spoofed Device • Screen Overlays • Phishing
• Call In • Auth Renewal
• Cross-Channel
Progress • Remote Access • Block Lists
• Navigation Flow
• Non-Human
(BOT)
Full Protection !!
Account
Open Account Account Login Activities Transactions
Example: How does it work?
Login Browse Action
Web User
Visible
Mobile
User
Real time
User Profiling
• Geo Location • Abnormal behavior
• Behavior • Fraud patterns • Allow
• Malware • … • Step-up
• Network • Restrict
• ... • Deny
Consortium
20
IBM Security Trusteer @ 2023
The power of Strong US Alert Distribution of Session Risk Reason
Analytics 3%
3%
2%
19%
Access from a known fraudster device
3%
Unusual access using suspicious device attributes
4%
Suspicious access using a Virtual Machine
21
Threat Research
Lab
Threat
Engineers
Security Reverse
Developers Engineers
Phishing Mobile
Analysts Researchers
Data Web
Scientists Researchers
Fraud
Analysts
22
Case Management & Auto-Response
23
▪ Adoption of an integrated and business-wide
approach to cyber security
Cybersecurity ▪ A collaborative Cybersecurity Strategy involving all
Strategy
stakeholders.
▪ Make the end-user the first line of defense
A proactive approach ▪ IT as a strategic function – ITSM / ITIL
to preventing Cyber ▪ Develop and operationalise Cybersecurity
policy
attacks
▪ BYOD policy
▪ Disaster Recovery Plan
▪ Cybersecurity Incident Response Teams
▪ Auditing and enforcement of cybersecurity
compliance
Never Trust, Always Verify
Questions
Thank You!!
[email protected]
[email protected]
+263713385554
“CYBER FRAUD SUMMIT”
CYBER SECURITY | CYBER FINANCIAL CRIME
Detection, Prevention, Investigation, and Reporting
Sprayview Hotel | Victoria Falls| 18 – 22 September 2023
Dr. Whisper Rukanda|+27 73 635 5777 | +263 772 410 555 |
[email protected]
Cyber Liability Insurance
Presentation
Alwin Kopera
Underwriting Manager (FBC Re)
9/19/2023 2
Presentation Outline
• Introduction
• General overview of cyber matters-Insurance perspective
• Major Causes of Data Breaches
• Highlights; Global Cyber Losses
9/19/2023 4
INTRODUCTION
9/19/2023 5
OVERVIEW OF CYBER RISK MATTERS
9/19/2023 7
Major Causes of Data Breach(es)
Phishing
Social Engineering
9/19/2023 8
Ransomware
Double extortion
Cyber criminals combine the initial Hackers will also now attempt to
encryption of data with a secondary encrypt or delete backups, making
form of extortion, such as the threat to restoration and recovery more difficult
release sensitive or personal data. or impossible.
9/19/2023 9
Ransomware
9/19/2023 10
Global Cyber Losses Highlights
(A case of Allianz)
9/19/2023 11
What is Cyber Liability Insurance?
9/19/2023 12
CYBER LIABILITY
EXPOSURE FACTORS
THAT SHOULD
INFLUENCE YOU TO
BUY CYBER LIABILITY
INSURANCE
9/19/2023 13
❑ Scenario 1 :-Denial Of Service Attack
Does your company’s revenue depend on transaction
volumes/ day or hr?
Do your clients have an alternative during your downtime?
How much would your company lose if You are not
operating for a day?
Do your operating costs reduce because your system is
down?
How much will it Cost to bring back your system up? Will
you pay ransom, hire a forensic expert and investigator.
How much will all that cost?
BANKERS, TELECOMMUNICATIONS,
HOTELIERS, ONLINE RETAILERS.
9/19/2023 14
• Scenario 2- Theft/loss of Digital Assets
Does your business transact online?
Do you make payments based on email instruction- How much
would you pay to the wrong recipient in a phishing incident?
How much money can you possibly lose in an attack.
Is digital money part of your stock.
Do you keep digital assets which can be monetised ?
Do you keep money/digital assets belonging to others?
If you are sued to the extent of their loss will your business
survive?
If you lose your records, how much may you fail to recover
from Debtors/Customers OR how much extra can you pay ?
9/19/2023 15
•Scenario 3 - Espionage Motivated Breach
Does your business benefit from secret recipes/ formulas
What’s the potential loss if the formula is known by
competitors or the public
Can an attack result in compromised quality
What is the cost of product recall or condemnation
Will the attack cause permanent loss of confidence in your
product
To what extent will an attack affect your market share?
MANUFACTURING INDUSTRY, RESTAURANTS,
FAST FOODS
9/19/2023 16
Risks posed by an information security breach
• Reputational damage
• System unavailability and downtime
• Loss of revenue, data or competitive advantage
• Litigation arising from compromised data
• Costs incurred in responding to an incident:
• Legal defence and settlement
• Forensic investigation
• Affected party notification and remediation
• Public relations costs
• Industry / regulatory fines and penalties
9/19/2023 17
CYBER LIABILITY POLICY STRUCTURE
9/19/2023 18
First Party Cover
❖ Loss or damage to digital assets
❖ Cyber Extortion
❖ Reputational damage
9/19/2023 19
Loss or damage to digital assets
9/19/2023 20
Business interruption from system downtime
9/19/2023 21
Attempt to extort money by threatening to damage
or restrict the network, release data obtained from
the network and/or communicate with the customer
base under false presences to obtain personal
information
9/19/2023 22
Reputational damage
9/19/2023 23
Direct monetary losses and associated disruption
from theft of computer equipment, as well as
electronic theft of funds / money from the
organisation by hacking or other type of cyber
crime
9/19/2023 24
Third Party Coverage
9/19/2023 25
Third Party Coverage
• Defense costs
• Privacy and Data Breach Cover
• Fines and penalties
Regulatory fines
Industry associations fines
9/19/2023 26
Services Coverage
Crisis
Communication Consultation Cover
Cover
9/19/2023 27
Underwriting Considerations for cyber liability insurance
9/19/2023 28
Examples of potential cyber claims
✔ Man in court for triggering BancABC VISA card crisis that caused hell for thousands (zimlive.com)
(Oct 2021)
✔ Cybercriminals hack ZESA and have control of critical systems and terabytes of sensitive data? –
Techzim (August 2023)
9/19/2023 29
Cyber Liability Claims Management
Resources required
•Lawyers
•Forensic Experts
•PR experts to manage a crisis
•Call centre or easy access to one.
9/19/2023 30
Claims Management Process
1. Notification to Insurer as soon as breach is detected
2. External experts should move on site:
✔ Forensic expert on site for technical response
✔ Legal expert to guide through legal requirements and co-ordinate
from a legal point of view
✔ PR/Communications experts to implement communications strategy
3. Obtain legal guidance as regards necessary on notification to breached
parties. This is where regulatory requirement become critical.
4. Affected individuals notified. Ongoing containment of breach. Get client
back to business (BI!).
9/19/2023 31
Thank you….