Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
The New Battle Of Britain: Reset Your Security
1. THE NEW BATTLE OF BRITAIN:
RESET YOUR SECURITY
Etienne Greeff
Chief Executive Officer
www.secdata.com
1
2. THE STRATEGIC SECURITY CONUNDRUM
Security spend continues to increase
2006
$9.6 billion
2012
$22 billion
2017
$30.1 billion
…but so does
the number of
security
breaches
• 621 reported
in the last 12
months
• Up 23% over
the past 3
years
At the same
time, CEOs
expect IT to
cost less
But we expect
availability,
integrity and
confidentiality
We are not
winning the
arms race
*Data from Canalys and Verizon, 2013
2
3. WE KNOW SECURITY IS CHANGING
THREATS
Threats are more
sophisticated, evolving
and on the rise
REGULATION
Enhanced regulatory
environment driving
cost and complexity
IT CONSUMPTION
Cloud, mobility and
consumerisation are
becoming mainstream
3
4. WE KNOW BUSINESSES ARE CHANGING
BYOA
Cloud
Mobile workers
IT consumption is changing
BYOD
Remote access
You can’t build a defensive
wall around your
organisation anymore
4
5. BUT SECURITY TEAMS ARE PARALYSED
Limited
investment has
to address all
security
requirements
Facing conflicting
security
requirements
Focused on new
technologies
Overwhelmed by
system
complexity
Distracted by
high-profile
threats
Talent shortage
and expert
resource scarcity
5
8. OUR VISION AND BELIEFS
Secure customer enablement
Our beliefs
We aim to enable our customers to use
the Internet, cloud computing and
business applications to their full
potential in a secure way by providing
relevant security solutions and services
Every business is a security customer
We focus on minimising customer
downtime and business disruption
and solving business challenges
through expert agnostic consultancy
and security solutions development and
service delivery
Point solutions alone won’t solve
security problems
We enable security professionals to say
‘yes’ to business needs in a flexible and
secure way
It is important to look at the complete
picture to ensure the infrastructure is
available and secure
Solutions must be future-proofed to
deal with the evolving threat landscape
Security services partners should offer
transparent pricing and complete
visibility of all operations
8
9. COMPLETE SECURITY FRAMEWORK
Understand
the assets
you are
trying to
protect
Implement
methods to
detect
threats and
vulnerabilities
Apply this
knowledge to
protect
valuable
assets
Employ
contingency
and incident
response
practices
9
10. COMPLETE SECURITY PROCESS
REMEDIATION
1. Identify
valuable
assets
2. Identity
what the
risks are
3. Decide
which risks
to Accept,
Mitigate,
Manage or
Ignore
RISK
ASSESSMENT
BUSINESS
CASE
IN-HOUSE
OR MSP?
1. Mitigate
known
risks with
early
threat
detection
2. Manage
unknown
risk with
proactive
detection
1. Integrate
knowledge
into
protection
strategy
2. Tune device
features to
THREAT
INTELLIGENCE
protect
identified
assets
3. Use realtime
feedback to
enhance
protection
METRICS
1. Develop
an
incident
response
plan
2. Take
specialist
advice for
faster
resolution
3. Develop
response
toolkits
10
12. CAPABILITIES AND APPROACH
AffinitySecure
• AffinitySecure is our cloudbased 24x7x365 real-time
monitoring platform
• We offer real-time threat
intelligence across our
customer base
• Over 5000 devices under
management, enabling
proactive threat detection
for customers
• 20% of logged calls are
generated through
AffinitySecure monitoring
• We monitor customer
infrastructures for
Confidentiality, Integrity
and Availability, far beyond
most monitoring tools and
platforms
Service-centric
Technical expertise
•
60+ certified technical
experts, including SC cleared
•
95% customer contract
renewal rate
•
24x7x365 manned Security
Operations Centre
•
•
ISO 27001 – throughout the
entire organisation
71% of customers would
recommend SecureData (Net
Promoter Score survey 2013)
•
Dedicated service and
account managers focus on
enabling business solutions
that solve customer
challenges
•
Technical guardians keep
customers in touch with
technology innovations
•
We work hard to partner
with customers, and offer
flexibility to customisation
options
•
Our staff have the desire to
do the best possible job every
time
•
PCI QSAC – Qualified
Security Assessors
•
ISO 9001 / BS7799
certified throughout
•
IL2 and IL3 accredited SOC
•
Strict adherence to ITIL v3
service management best
practices
•
Accredited UK government
Public Services Network
(PSN) provider
12
14. BUSINESS VALUE THROUGH SECURITY
Because
you want to
say ‘yes’
Improved
availability
and
reduced
downtime
Less issues
in future
Improve IT
& business
agility
Use big data
and
visualisation
to provide
threat
intelligence
Early
warning
detection
Controlled
mitigation
Governance,
risk and
compliance
Complete
visibility
over issues
14
We live in a world of compromisesWe don’t have unlimited budget, we don’t have unlimited Decide what the right compromises areDon’t have to spend money on taking care of every threatMitigate it by having a proper real time detection in place and integrating it back into your protection technologyIntelligent investment decisions to unknown threats