Escolar Documentos
Profissional Documentos
Cultura Documentos
InfoSec Updates
WHOAMI
Semi Yulianto // semi.yulianto@sgi-asia.com
Information Security Practitioner
MCP, MCSA, MCSE, MCDBA, MCTS, MCITP, MCT, CCNA, CCNP, CCA, CIW-P, CIW-SA, CEH, CHFI,
ECSA, ECSP, EDRP, CEI, SSCP, CISSP, CASP, CSSLP, CISA, CISM
EC-Council Best Trainer Of The Year 2008 (Asia Pacific) & Instructor of Excellence 2010
(Asia Pacific)
1st Rank Distinguished Speaker @ SecureAsia 2008 (Asia Pacific)
CompTIA Security+ Subject Matter Expert (SME) 2013 / 2014
(ISC)2 Authorized Official Training Instructor 2014 / 2015
Technical Writer and Reviewer for Packt Publishing (UK), PenTest Magazine (Poland) & CISO
Magazine Indonesia
Author of Writing an Effective Penetration Testing Report @ PenTest Magazine
(Poland)
IS Security Auditor, Penetration Tester, Ethical Hacker, Forensics Analyst & Cyber Crime
Expert Advisor
Senior Technical Trainer with Regional and International experience (Indonesia, Malaysia,
Singapore, Thailand, Bhutan, Philippines, Saudi Arabia/KSA, Tunisia & South Korea, etc.)
Good track of record in delivering IT Security courses & consulting services to POLRI,
KEMENHAM, BMKG, BASARNAS, BI, CIMB Bank, Bank Danamon, BCA, QNB, PANIN Bank,
Astra International (Indonesia), Bhutan Royal Police (Thailand-Bhutan), TUNTEL (Tunisia),
SAAB & Atijari Bank (KSA), US Air Force (South Korea), HP Fortify Team (Philippines & USA),
InfoSec Updates
Page 2
DELL Asia Pacific (Malaysia) etc.
Agenda
Introduction
Cyber
Security
Trends
Penetration
Testing
InfoSec Updates
Hacking &
Pen-Test
Live DEMO
Page 3
INTRODUCTION
InfoSec Updates
Page 4
Introduction | Information
Information is the new currency of business, with instant accessibility
across international, corporate and organizational boundaries. Most of the
world is now connected via the internet. While this has enabled global
connectivity and business growth, it has also fostered cyber modification,
theft and destruction.
The increasing severity and number of attacks means that companies
without adequate protection programs and systems are extremely
vulnerable. Attacks on information assets, whether malicious or
inadvertent, can seriously disable or destroy an organization by damaging
operations, brand and financial stability.
InfoSec Updates
Page 5
InfoSec Updates
Page 6
InfoSec Updates
Page 7
CYBER SECURITY
TRENDS
InfoSec Updates
Page 8
InfoSec Updates
Page 9
InfoSec Updates
Page 10
InfoSec Updates
Page 11
InfoSec Updates
Page 12
InfoSec Updates
Page 13
InfoSec Updates
Page 14
InfoSec Updates
Page 15
InfoSec Updates
Page 16
InfoSec Updates
Page 17
InfoSec Updates
Page 18
InfoSec Updates
Page 19
InfoSec Updates
Page 20
InfoSec Updates
Page 21
InfoSec Updates
Page 22
InfoSec Updates
Page 23
InfoSec Updates
Page 24
InfoSec Updates
Page 25
InfoSec Updates
Page 26
InfoSec Updates
Page 27
InfoSec Updates
Page 28
InfoSec Updates
Page 29
InfoSec Updates
Page 30
PENETRATION
TESTING
InfoSec Updates
Page 31
InfoSec Updates
Page 32
InfoSec Updates
Page 33
InfoSec Updates
Page 34
InfoSec Updates
Page 35
HACKING &
PENETRATION
TESTING LIVE DEMO
InfoSec Updates
Page 36
InfoSec Updates
Page 37
Question?
InfoSec Updates
Page 38