SlideShare uma empresa Scribd logo
1 de 26
Your cyber security
roadmap
• Introduction
• Andrew Burke - Chief Technology Officer, Empired
• Sven Ross - Chief Executive Officer, Diamond Cyber
• Mark Blower - National Business Manager – Networks and Security, Empired
• Why are we vulnerable to a cyber attack?
• What can we do to mitigate the threat?
• How the threat landscape is changing
• How Empired can help
• Free offering and competition
• Questions
2
Agenda
Introduction
Why are we here?
• Business beats with a digital heart
• Rates of cyber crime increasing exponentially
• Cyber crime is highly lucrative and largely anonymous
• Attacks are becoming increasingly sophisticated, targeted and
persistent risk profiles are ever increasing
We need to stay one step ahead
Why are we vulnerable to cyber attack?
The face of cyber crime has changed
• A commercial venture with low point of entry
• Anonymous ransomware
• Large scale, industrial approach to exploitation
• New threats by the minute
5
Why are we so vulnerable to cyber attack
• The manipulation of people and
technology to do something other
than its original purpose
• The intention behind the hacking
dictates whether it is malicious or not
• Effective law enforcement and
prevention of cyber crime is difficult for
many reasons
What is hacking?
In business we have competing demands:
• Market share and profitability
• Responding to customer demand
• Innovating your products and services
IT systems are connected together like never before.
Truly effective cyber security management requires a broader view
than just IT.
Where to find the time to ‘be secure’?
Competing demands vie for our attention
Source: Diamond Cyber
Time is a key construct of vulnerability to malicious activity.
• The competing demands of business vie for all our time.
• The IT teams’ available time is split between new initiatives,
innovation, break/fix, proactive management and more.
For the cyber criminal time is their most valuable asset.
• A persistent threat attacker is spending more time trying to break in
than you are trying to prevent it.
The attacker may be more dedicated
Source: Diamond Cyber
The attacker may be more dedicated
Time spent on defensive
measures, limited by cost,
prioritised by uptime.
Level of security
achieved,
measured in time-
to-compromise.
Efficiency
Hacker:
Time invested in achieving
compromising, limited by
motivation. Example: Criminal
No compromise
Compromise
Hacker:
Time invested in achieving
compromising, limited by
motivation. Example: State
This is why a realistic threat
should dictate defensive
spend, and why defensive
efficiency (strategy) is
important
Source: Diamond Cyber
To a large extent, we are vulnerable due to
the compliance driven approach to security.
• Some of us have an annual audit for security
• Sometimes security checks are done outside of
audits
Hackers do not wait for your yearly security
audits to create new attacks!
Process; a help and a hindrance
6 Months
6 Months
Source: Diamond Cyber
Advanced
• Targeted, coordinated,
purposeful
Persistent
• Month after month, year
after year
Threat
• Person(s) with intent,
opportunity and capability
The Cyber Kill Chain 1. Reconnaissance
Harvesting email addresses,
conference information, etc.
7. Actions on objective
With ‘hands on’ access the
intruders accomplish their goal
2. Weaponisation
Couple exploit with
backdoor into a payload.
3. Delivery
Delivery of exploit to victim.
Email, web, USB, etc.
6. Command and control
Command channel for remote
manipulation
4. Installation
Installing malware on the asset
5. Exploitation
Exploit a vulnerability to
execute code on the asset
Source: Diamond Cyber
What can we do to mitigate the threat?
Understand the enemy
• Persistent, advanced and human-based. Actively probing for weakness
• Multiple threat vectors, changing daily
• Likely spending more time trying to attack you than you are defending
Identify your risks and exposure
• Where are your information assets and how protected are they?
• Where are your weaknesses?
Build a defensive strategy and execute upon it
• Plan to protect what matters the most
Continuously validate its effectiveness
• Optimise your defences by probing for weaknesses
What should businesses do?
What should business do?
Develop a cyber program
• Identify business/mission objectives and high-level organisational priorities
• Determine the scope of systems and assets that support the selected business line or process
• Identify related systems and assets, regulatory requirements, and overall risk approach
• Identify the Threat Groups most likely to target the organisation and understand why.
Prioritise,
Scope &
Orient
• Identify a framework to reference cyber control definitions (NIST, COBIT, ISO 27001, CIS-CSC)
• Develops a Current Profile by indicating what cyber controls currently exist in the business
• Determine the maturity of controls
Create
Current State
Profile
• Assessment is guided by the organisation’s overall risk management process or previous risk
assessment activities.
• Analyse the operational environment in order to discern the likelihood of a cybersecurity event
and the impact that the event could have on the organisation.
• Identify the Most Likely and Most Dangerous threat scenario’s which could occur.
Conduct Risk
Assessment
Cyber program development
• Create a Target Profile that focuses on the assessment of the identified Controls describing the
organisation’s desired cybersecurity outcomes
• Consider influences and requirements of external stakeholders such as sector entities, customers,
and business partners when creating a Target Profile
Create Target
State Profile
• Compare the Current Profile and the Target Profile to determine gaps
• Create a prioritised action plan to address those gaps that draws upon mission drivers, a
cost/benefit analysis, and understanding of risk to achieve the outcomes in the Target Profile
• Determine resources necessary to address the gaps`
Determine &
Prioritise
Gaps
• Determine which actions to take in regards to the gaps, if any, identified in the previous step
• Monitor the cybersecurity practices against the Target Profile
Implement
Action Plan
Cyber program development
17
Cyber program development – Core Functions
Identify
Protect
DetectRespond
Recover
• Identify the components of your business that require
protection and how this is achieved.
• Implement process and technology to protect your
information assets.
• Build capability to detect when an attack may occur, is
occurring or has occurred.
• Establish people, process and technology to respond to
cyber incidents.
• Create a cyber resilient business that is capable of
recovering from cyber incidents.
How the threat landscape is changing
“Only two things are infinite, the universe and human
stupidity, and I'm not sure about the former” Albert Einstein
• The traditional firewall and E-mail
protection is dead
• Next generation firewalls (UTMs)
and advanced mail protection are a
step in the right direction
• We need threat analytics and real
time protection
• Considerations for bespoke vs
unified solutions
Perimeter protection
Antivirus technology is dated and
not effective
We need:
• Real time protection
• Ways to enforce corporate
policy to the remote worker
• Mobile device protection
Antivirus and antimalware
• We can’t consider the wired
network is safe anymore
• Provide accessibility to the
correct people
• Prepare yourself for IoT
Protect your network
Application Control Devices (ACDs)
provide visibility of who accesses what
and when.
They enable us to
• Protect the application in any
location
• Provision accessibility for the correct
user and block others
Protect your application
Insight is a crucial to effective
management of the threat landscape
No visibility = minimal benefit
Unify systems
Security Incident and Event
Management
Visibility and monitoring
How Empired can help
How Empired can help
Audit
and
compliance
Enhancement
and
remediation
Threat response
and
containment
Thank you.

Mais conteúdo relacionado

Mais procurados

National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionPECB
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Matthew Rosenquist
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 

Mais procurados (20)

National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
The red book
The red book  The red book
The red book
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Topic11
Topic11Topic11
Topic11
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 

Semelhante a Your cyber security webinar

Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesHinne Hettema
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptxBoni Yeamin
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security BreakfastRackspace
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael JosephiuvoTechnologies
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Robi Sen
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 

Semelhante a Your cyber security webinar (20)

What to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breachWhat to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breach
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 
Grc tao.4
Grc tao.4Grc tao.4
Grc tao.4
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 

Mais de Empired

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Empired
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral TeamsEmpired
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personalEmpired
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesEmpired
 
Empired Convergence 2017 - Transforming you customer experience
Empired Convergence 2017 - Transforming you customer experienceEmpired Convergence 2017 - Transforming you customer experience
Empired Convergence 2017 - Transforming you customer experienceEmpired
 
Empired convergence 2017 - Data as your Most Strategic Asset
Empired convergence 2017 - Data as your Most Strategic AssetEmpired convergence 2017 - Data as your Most Strategic Asset
Empired convergence 2017 - Data as your Most Strategic AssetEmpired
 
Empired Convergence 2017 - Business Transformation Across the Enterprise
Empired Convergence 2017 - Business Transformation Across the EnterpriseEmpired Convergence 2017 - Business Transformation Across the Enterprise
Empired Convergence 2017 - Business Transformation Across the EnterpriseEmpired
 
Empired Convergence 2017 - Bringing your People on the Change Journey
Empired Convergence 2017 - Bringing your People on the Change JourneyEmpired Convergence 2017 - Bringing your People on the Change Journey
Empired Convergence 2017 - Bringing your People on the Change JourneyEmpired
 
Empired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why ConvergenceEmpired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why ConvergenceEmpired
 
Empired Convergence 2017 - Unleashing the Power of the Platform
Empired Convergence 2017 - Unleashing the Power of the PlatformEmpired Convergence 2017 - Unleashing the Power of the Platform
Empired Convergence 2017 - Unleashing the Power of the PlatformEmpired
 
Empired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital WorkplaceEmpired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital WorkplaceEmpired
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired
 
Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design Empired
 
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
Dynamics Day 2017 Adelaide  - Dynamics 365 making it realDynamics Day 2017 Adelaide  - Dynamics 365 making it real
Dynamics Day 2017 Adelaide - Dynamics 365 making it realEmpired
 
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise OperationsDynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise OperationsEmpired
 
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...Empired
 
Disaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads storyDisaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads storyEmpired
 
Dynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision makingDynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision makingEmpired
 
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital TransformationDynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital TransformationEmpired
 
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operationsDynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operationsEmpired
 

Mais de Empired (20)

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral Teams
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personal
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft Technologies
 
Empired Convergence 2017 - Transforming you customer experience
Empired Convergence 2017 - Transforming you customer experienceEmpired Convergence 2017 - Transforming you customer experience
Empired Convergence 2017 - Transforming you customer experience
 
Empired convergence 2017 - Data as your Most Strategic Asset
Empired convergence 2017 - Data as your Most Strategic AssetEmpired convergence 2017 - Data as your Most Strategic Asset
Empired convergence 2017 - Data as your Most Strategic Asset
 
Empired Convergence 2017 - Business Transformation Across the Enterprise
Empired Convergence 2017 - Business Transformation Across the EnterpriseEmpired Convergence 2017 - Business Transformation Across the Enterprise
Empired Convergence 2017 - Business Transformation Across the Enterprise
 
Empired Convergence 2017 - Bringing your People on the Change Journey
Empired Convergence 2017 - Bringing your People on the Change JourneyEmpired Convergence 2017 - Bringing your People on the Change Journey
Empired Convergence 2017 - Bringing your People on the Change Journey
 
Empired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why ConvergenceEmpired Convergence 2017 - Why Convergence
Empired Convergence 2017 - Why Convergence
 
Empired Convergence 2017 - Unleashing the Power of the Platform
Empired Convergence 2017 - Unleashing the Power of the PlatformEmpired Convergence 2017 - Unleashing the Power of the Platform
Empired Convergence 2017 - Unleashing the Power of the Platform
 
Empired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital WorkplaceEmpired Convergence 2017 - The Modern Digital Workplace
Empired Convergence 2017 - The Modern Digital Workplace
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design Dynamics Day 2017 Adelaide - Customer Experience Design
Dynamics Day 2017 Adelaide - Customer Experience Design
 
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
Dynamics Day 2017 Adelaide  - Dynamics 365 making it realDynamics Day 2017 Adelaide  - Dynamics 365 making it real
Dynamics Day 2017 Adelaide - Dynamics 365 making it real
 
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise OperationsDynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
Dynamics Day 2017 Adelaide - Dynamics 365 Enterprise Operations
 
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
Dynamics Day 2017 Adelaide - IoT, Machine Learning and Big Data actionable in...
 
Disaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads storyDisaster Recovery: the Main Roads story
Disaster Recovery: the Main Roads story
 
Dynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision makingDynamics Day 2017 Melbourne - transform you decision making
Dynamics Day 2017 Melbourne - transform you decision making
 
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital TransformationDynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
Dynamics Day 2017 Melbourne - Melbourne Racing Club Digital Transformation
 
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operationsDynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
Dynamics Day 2017 Melbourne: Dynamics 365 Enterprise operations
 

Último

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Your cyber security webinar

  • 2. • Introduction • Andrew Burke - Chief Technology Officer, Empired • Sven Ross - Chief Executive Officer, Diamond Cyber • Mark Blower - National Business Manager – Networks and Security, Empired • Why are we vulnerable to a cyber attack? • What can we do to mitigate the threat? • How the threat landscape is changing • How Empired can help • Free offering and competition • Questions 2 Agenda
  • 3. Introduction Why are we here? • Business beats with a digital heart • Rates of cyber crime increasing exponentially • Cyber crime is highly lucrative and largely anonymous • Attacks are becoming increasingly sophisticated, targeted and persistent risk profiles are ever increasing We need to stay one step ahead
  • 4. Why are we vulnerable to cyber attack?
  • 5. The face of cyber crime has changed • A commercial venture with low point of entry • Anonymous ransomware • Large scale, industrial approach to exploitation • New threats by the minute 5 Why are we so vulnerable to cyber attack
  • 6. • The manipulation of people and technology to do something other than its original purpose • The intention behind the hacking dictates whether it is malicious or not • Effective law enforcement and prevention of cyber crime is difficult for many reasons What is hacking?
  • 7. In business we have competing demands: • Market share and profitability • Responding to customer demand • Innovating your products and services IT systems are connected together like never before. Truly effective cyber security management requires a broader view than just IT. Where to find the time to ‘be secure’? Competing demands vie for our attention Source: Diamond Cyber
  • 8. Time is a key construct of vulnerability to malicious activity. • The competing demands of business vie for all our time. • The IT teams’ available time is split between new initiatives, innovation, break/fix, proactive management and more. For the cyber criminal time is their most valuable asset. • A persistent threat attacker is spending more time trying to break in than you are trying to prevent it. The attacker may be more dedicated Source: Diamond Cyber
  • 9. The attacker may be more dedicated Time spent on defensive measures, limited by cost, prioritised by uptime. Level of security achieved, measured in time- to-compromise. Efficiency Hacker: Time invested in achieving compromising, limited by motivation. Example: Criminal No compromise Compromise Hacker: Time invested in achieving compromising, limited by motivation. Example: State This is why a realistic threat should dictate defensive spend, and why defensive efficiency (strategy) is important Source: Diamond Cyber
  • 10. To a large extent, we are vulnerable due to the compliance driven approach to security. • Some of us have an annual audit for security • Sometimes security checks are done outside of audits Hackers do not wait for your yearly security audits to create new attacks! Process; a help and a hindrance 6 Months 6 Months Source: Diamond Cyber
  • 11. Advanced • Targeted, coordinated, purposeful Persistent • Month after month, year after year Threat • Person(s) with intent, opportunity and capability The Cyber Kill Chain 1. Reconnaissance Harvesting email addresses, conference information, etc. 7. Actions on objective With ‘hands on’ access the intruders accomplish their goal 2. Weaponisation Couple exploit with backdoor into a payload. 3. Delivery Delivery of exploit to victim. Email, web, USB, etc. 6. Command and control Command channel for remote manipulation 4. Installation Installing malware on the asset 5. Exploitation Exploit a vulnerability to execute code on the asset Source: Diamond Cyber
  • 12. What can we do to mitigate the threat?
  • 13. Understand the enemy • Persistent, advanced and human-based. Actively probing for weakness • Multiple threat vectors, changing daily • Likely spending more time trying to attack you than you are defending Identify your risks and exposure • Where are your information assets and how protected are they? • Where are your weaknesses? Build a defensive strategy and execute upon it • Plan to protect what matters the most Continuously validate its effectiveness • Optimise your defences by probing for weaknesses What should businesses do?
  • 14. What should business do? Develop a cyber program
  • 15. • Identify business/mission objectives and high-level organisational priorities • Determine the scope of systems and assets that support the selected business line or process • Identify related systems and assets, regulatory requirements, and overall risk approach • Identify the Threat Groups most likely to target the organisation and understand why. Prioritise, Scope & Orient • Identify a framework to reference cyber control definitions (NIST, COBIT, ISO 27001, CIS-CSC) • Develops a Current Profile by indicating what cyber controls currently exist in the business • Determine the maturity of controls Create Current State Profile • Assessment is guided by the organisation’s overall risk management process or previous risk assessment activities. • Analyse the operational environment in order to discern the likelihood of a cybersecurity event and the impact that the event could have on the organisation. • Identify the Most Likely and Most Dangerous threat scenario’s which could occur. Conduct Risk Assessment Cyber program development
  • 16. • Create a Target Profile that focuses on the assessment of the identified Controls describing the organisation’s desired cybersecurity outcomes • Consider influences and requirements of external stakeholders such as sector entities, customers, and business partners when creating a Target Profile Create Target State Profile • Compare the Current Profile and the Target Profile to determine gaps • Create a prioritised action plan to address those gaps that draws upon mission drivers, a cost/benefit analysis, and understanding of risk to achieve the outcomes in the Target Profile • Determine resources necessary to address the gaps` Determine & Prioritise Gaps • Determine which actions to take in regards to the gaps, if any, identified in the previous step • Monitor the cybersecurity practices against the Target Profile Implement Action Plan Cyber program development
  • 17. 17 Cyber program development – Core Functions Identify Protect DetectRespond Recover • Identify the components of your business that require protection and how this is achieved. • Implement process and technology to protect your information assets. • Build capability to detect when an attack may occur, is occurring or has occurred. • Establish people, process and technology to respond to cyber incidents. • Create a cyber resilient business that is capable of recovering from cyber incidents.
  • 18. How the threat landscape is changing “Only two things are infinite, the universe and human stupidity, and I'm not sure about the former” Albert Einstein
  • 19. • The traditional firewall and E-mail protection is dead • Next generation firewalls (UTMs) and advanced mail protection are a step in the right direction • We need threat analytics and real time protection • Considerations for bespoke vs unified solutions Perimeter protection
  • 20. Antivirus technology is dated and not effective We need: • Real time protection • Ways to enforce corporate policy to the remote worker • Mobile device protection Antivirus and antimalware
  • 21. • We can’t consider the wired network is safe anymore • Provide accessibility to the correct people • Prepare yourself for IoT Protect your network
  • 22. Application Control Devices (ACDs) provide visibility of who accesses what and when. They enable us to • Protect the application in any location • Provision accessibility for the correct user and block others Protect your application
  • 23. Insight is a crucial to effective management of the threat landscape No visibility = minimal benefit Unify systems Security Incident and Event Management Visibility and monitoring
  • 25. How Empired can help Audit and compliance Enhancement and remediation Threat response and containment