Cybersecurity has become an essential and omnipresent concept in our lives. Currently, everything is controlled by computer systems, which forces us to take good care of our best practices related to cybersecurity and the management of data privacy. I created a presentation about this, I would like to share with you. This presentation incluse all these topics: (document is in Spanish) 1. Introduction to cybersecurity 2. Security in the physical and logical world 3. Security in the professional and personal field 4. Evolution of threats. Digital threat 5. Origins of the attacks to our network and objective assets of the attacks 6. Social engineering, identityRead More →

One of the procedural measures that have been introduced by Organic Law 13/2015, of October 5 (Spain), amending the Criminal Procedure Law for strengthening procedural safeguards and regulating technological research measures allows the Judicial Police The recording and recording of oral communications through the use of electronic devices and the use of technical devices for image capture, tracking and localization. The Judicial Police has all these technical tools: Tracking Devices Localization devices Image Capture Devices Voice Communication Intercept Devices Interception devices for telematic communications (eg, the possibility of identifying the IP, IMEI, device, etc.) Registration of Mass Storage Information Devices Remote logs on computer equipmentRead More →

During 2017 we will suffer ‘old’ threats like ransomware, cyber espionage and ‘hacktivist’ exposing privacy issues but in addition to known them, our threats list will upgrade so much adding new concepts like machine learning accelerates social engineering attacks or cloud computing providers infection. The list is a very long, so a big effort (time, money, people) is needed to mitigate all these risks. After reading more than 10 different reports about Cyber Security Threats 2017 published in Internet I did my own version. I hope you like it. You can see my presentation here: Cyber security threats for 2017 from Ramiro Cid  Read More →

Every year, the challenge of protecting our IT assets from growing threats and cyber attacks is growing. Once some malicious application is in our network and later can quickly move with traffic and produce a big impact in our the network. These attacks can be devastating. I created a presentation where I explain in details this topic, you can see my presentation here (in Spanish): ¿Cuáles son los peligros a los que se enfrenta su sistema informático? from Ramiro CidRead More →

Cyber Security Resilience & Risk Aggregation concepts have a near relationship because Risk aggregation refers to efforts done by firms to develop quantitative risk measures that incorporate multiple types or sources of risk. Cyber Security Resilience is the capacity to have different Cyber controls which can provide the organization an adequate resilience according the organization risk appetite by doing risk management of the aggregation of multiple types or sources of risk. One interesting topic is Internet of Things (IoT) which is increasing in our personal and professional life. The more assets are “shared” (including Critical Infrastructures and Smart Cities IT assets) the more risk we areRead More →