SlideShare uma empresa Scribd logo
1 de 15
THE NEW BATTLE OF BRITAIN:
RESET YOUR SECURITY
Etienne Greeff
Chief Executive Officer
www.secdata.com
1
THE STRATEGIC SECURITY CONUNDRUM
Security spend continues to increase

2006
$9.6 billion

2012
$22 billion
2017
$30.1 billion

…but so does
the number of
security
breaches
• 621 reported
in the last 12
months
• Up 23% over
the past 3
years

At the same
time, CEOs
expect IT to
cost less

But we expect
availability,
integrity and
confidentiality

We are not
winning the
arms race

*Data from Canalys and Verizon, 2013
2
WE KNOW SECURITY IS CHANGING

THREATS

Threats are more
sophisticated, evolving
and on the rise

REGULATION

Enhanced regulatory
environment driving
cost and complexity

IT CONSUMPTION

Cloud, mobility and
consumerisation are
becoming mainstream

3
WE KNOW BUSINESSES ARE CHANGING
BYOA
Cloud

Mobile workers

IT consumption is changing

BYOD

Remote access

You can’t build a defensive
wall around your
organisation anymore

4
BUT SECURITY TEAMS ARE PARALYSED

Limited
investment has
to address all
security
requirements

Facing conflicting
security
requirements

Focused on new
technologies

Overwhelmed by
system
complexity

Distracted by
high-profile
threats

Talent shortage
and expert
resource scarcity

5
WE NEED A DIFFERENT APPROACH

6
SECUREDATA
STRATEGY
OUR VISION AND BELIEFS
Secure customer enablement

Our beliefs

We aim to enable our customers to use
the Internet, cloud computing and
business applications to their full
potential in a secure way by providing
relevant security solutions and services

Every business is a security customer

We focus on minimising customer
downtime and business disruption
and solving business challenges
through expert agnostic consultancy
and security solutions development and
service delivery

Point solutions alone won’t solve
security problems

We enable security professionals to say
‘yes’ to business needs in a flexible and
secure way

It is important to look at the complete
picture to ensure the infrastructure is
available and secure

Solutions must be future-proofed to
deal with the evolving threat landscape
Security services partners should offer
transparent pricing and complete
visibility of all operations

8
COMPLETE SECURITY FRAMEWORK

Understand
the assets
you are
trying to
protect

Implement
methods to
detect
threats and

vulnerabilities

Apply this
knowledge to
protect
valuable
assets

Employ
contingency
and incident
response
practices

9
COMPLETE SECURITY PROCESS
REMEDIATION

1. Identify
valuable
assets
2. Identity
what the
risks are
3. Decide
which risks
to Accept,
Mitigate,
Manage or
Ignore

RISK
ASSESSMENT

BUSINESS
CASE

IN-HOUSE
OR MSP?

1. Mitigate
known
risks with
early
threat
detection
2. Manage
unknown
risk with
proactive
detection

1. Integrate
knowledge
into
protection
strategy
2. Tune device
features to
THREAT
INTELLIGENCE
protect
identified
assets
3. Use realtime
feedback to
enhance
protection

METRICS

1. Develop
an
incident
response
plan
2. Take
specialist
advice for
faster
resolution
3. Develop
response
toolkits

10
COMPLETE SECURITY SERVICES
Complete proactive security

SecureData Operations Centre + SecureData Labs
11
CAPABILITIES AND APPROACH

AffinitySecure
• AffinitySecure is our cloudbased 24x7x365 real-time
monitoring platform
• We offer real-time threat
intelligence across our
customer base
• Over 5000 devices under
management, enabling
proactive threat detection
for customers
• 20% of logged calls are
generated through
AffinitySecure monitoring
• We monitor customer
infrastructures for
Confidentiality, Integrity
and Availability, far beyond
most monitoring tools and
platforms

Service-centric

Technical expertise
•

60+ certified technical
experts, including SC cleared

•

95% customer contract
renewal rate

•

24x7x365 manned Security
Operations Centre

•

•

ISO 27001 – throughout the
entire organisation

71% of customers would
recommend SecureData (Net
Promoter Score survey 2013)

•

Dedicated service and
account managers focus on
enabling business solutions
that solve customer
challenges

•

Technical guardians keep
customers in touch with
technology innovations

•

We work hard to partner
with customers, and offer
flexibility to customisation
options

•

Our staff have the desire to
do the best possible job every
time

•

PCI QSAC – Qualified
Security Assessors

•

ISO 9001 / BS7799
certified throughout

•

IL2 and IL3 accredited SOC

•

Strict adherence to ITIL v3
service management best
practices

•

Accredited UK government
Public Services Network
(PSN) provider

12
WHY THIS
MATTERS
BUSINESS VALUE THROUGH SECURITY

Because
you want to
say ‘yes’

Improved
availability
and
reduced
downtime

Less issues
in future

Improve IT
& business
agility

Use big data
and
visualisation
to provide
threat
intelligence

Early
warning
detection

Controlled
mitigation

Governance,
risk and
compliance

Complete
visibility
over issues

14
THANK YOU
Etienne Greeff
CEO
etienne.greeff@secdata.com
+44 1622 723400

15

Mais conteúdo relacionado

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

The New Battle Of Britain: Reset Your Security

  • 1. THE NEW BATTLE OF BRITAIN: RESET YOUR SECURITY Etienne Greeff Chief Executive Officer www.secdata.com 1
  • 2. THE STRATEGIC SECURITY CONUNDRUM Security spend continues to increase 2006 $9.6 billion 2012 $22 billion 2017 $30.1 billion …but so does the number of security breaches • 621 reported in the last 12 months • Up 23% over the past 3 years At the same time, CEOs expect IT to cost less But we expect availability, integrity and confidentiality We are not winning the arms race *Data from Canalys and Verizon, 2013 2
  • 3. WE KNOW SECURITY IS CHANGING THREATS Threats are more sophisticated, evolving and on the rise REGULATION Enhanced regulatory environment driving cost and complexity IT CONSUMPTION Cloud, mobility and consumerisation are becoming mainstream 3
  • 4. WE KNOW BUSINESSES ARE CHANGING BYOA Cloud Mobile workers IT consumption is changing BYOD Remote access You can’t build a defensive wall around your organisation anymore 4
  • 5. BUT SECURITY TEAMS ARE PARALYSED Limited investment has to address all security requirements Facing conflicting security requirements Focused on new technologies Overwhelmed by system complexity Distracted by high-profile threats Talent shortage and expert resource scarcity 5
  • 6. WE NEED A DIFFERENT APPROACH 6
  • 8. OUR VISION AND BELIEFS Secure customer enablement Our beliefs We aim to enable our customers to use the Internet, cloud computing and business applications to their full potential in a secure way by providing relevant security solutions and services Every business is a security customer We focus on minimising customer downtime and business disruption and solving business challenges through expert agnostic consultancy and security solutions development and service delivery Point solutions alone won’t solve security problems We enable security professionals to say ‘yes’ to business needs in a flexible and secure way It is important to look at the complete picture to ensure the infrastructure is available and secure Solutions must be future-proofed to deal with the evolving threat landscape Security services partners should offer transparent pricing and complete visibility of all operations 8
  • 9. COMPLETE SECURITY FRAMEWORK Understand the assets you are trying to protect Implement methods to detect threats and vulnerabilities Apply this knowledge to protect valuable assets Employ contingency and incident response practices 9
  • 10. COMPLETE SECURITY PROCESS REMEDIATION 1. Identify valuable assets 2. Identity what the risks are 3. Decide which risks to Accept, Mitigate, Manage or Ignore RISK ASSESSMENT BUSINESS CASE IN-HOUSE OR MSP? 1. Mitigate known risks with early threat detection 2. Manage unknown risk with proactive detection 1. Integrate knowledge into protection strategy 2. Tune device features to THREAT INTELLIGENCE protect identified assets 3. Use realtime feedback to enhance protection METRICS 1. Develop an incident response plan 2. Take specialist advice for faster resolution 3. Develop response toolkits 10
  • 11. COMPLETE SECURITY SERVICES Complete proactive security SecureData Operations Centre + SecureData Labs 11
  • 12. CAPABILITIES AND APPROACH AffinitySecure • AffinitySecure is our cloudbased 24x7x365 real-time monitoring platform • We offer real-time threat intelligence across our customer base • Over 5000 devices under management, enabling proactive threat detection for customers • 20% of logged calls are generated through AffinitySecure monitoring • We monitor customer infrastructures for Confidentiality, Integrity and Availability, far beyond most monitoring tools and platforms Service-centric Technical expertise • 60+ certified technical experts, including SC cleared • 95% customer contract renewal rate • 24x7x365 manned Security Operations Centre • • ISO 27001 – throughout the entire organisation 71% of customers would recommend SecureData (Net Promoter Score survey 2013) • Dedicated service and account managers focus on enabling business solutions that solve customer challenges • Technical guardians keep customers in touch with technology innovations • We work hard to partner with customers, and offer flexibility to customisation options • Our staff have the desire to do the best possible job every time • PCI QSAC – Qualified Security Assessors • ISO 9001 / BS7799 certified throughout • IL2 and IL3 accredited SOC • Strict adherence to ITIL v3 service management best practices • Accredited UK government Public Services Network (PSN) provider 12
  • 14. BUSINESS VALUE THROUGH SECURITY Because you want to say ‘yes’ Improved availability and reduced downtime Less issues in future Improve IT & business agility Use big data and visualisation to provide threat intelligence Early warning detection Controlled mitigation Governance, risk and compliance Complete visibility over issues 14

Notas do Editor

  1. Regulation
  2. Internal message
  3. We live in a world of compromisesWe don’t have unlimited budget, we don’t have unlimited Decide what the right compromises areDon’t have to spend money on taking care of every threatMitigate it by having a proper real time detection in place and integrating it back into your protection technologyIntelligent investment decisions to unknown threats