Short presentation reviewing an organisations security experience and making sure its enough to protect the business and its assets / intellectual property #ITSecurity
2. Hello!
Neil Kemp - Network &
Security Limited
We run an IT Security Consultancy for
Businesses looking to improve their IT
Security Posture and Strategy
4. “Attackers are getting slicker, better and
faster at what they do, also at a higher rate
than most IT Security Professionals are
improving their skills.
5. Many Businesses Underestimate the value of Data
+ Intellectual Property
+ Financial Data
+ Customer Data
+ Employee Data
The value of your business is in your data and
intellectual property.
6. Your Organisation’s Security Needs
Businesses first need to ask “What data do we need
to protect?” Then, look for a solution.
7. Businesses can majorly
underestimate their needs
since data can be accessed
anywhere and everywhere -
cloud, phone, computer.
You can also split your content
Don’t think of security as an
expense, consider it an
investment.
8. Key Security Strategy Components
Risk Assess
Risks can be hard to
eliminate, but possible
to mitigate with
controls and actions.
Identify the threats to
your business and
prioiritise actions.
Audits & Reviews
It's important to run
these processes to
fully determine
whether your
processes and
controls adequately
protects the business
assets.
Incident Management
Have a plan in place
for when things go
wrong. Have a defined
list of contacts, both
internal and trusted
third parties, that can
be called upon in an
emergency.
9. A Designated Security
Officer
Whether internal or outsourced, a
security officer has the
responsibility of coordinating and
executing the Security Strategy