SlideShare uma empresa Scribd logo
1 de 29
ENTERPRISE CYBERSECURITY
“1 in 6 [of web-based applications] is a malware-related app. Imagine that from
the time of floppy disk drives where there would be 15 viruses a month, there
is now millions of malware being discovered on a daily basis.”
– Bill Chang, CEO of Group Enterprise, SingTel
“ENTERPRISE CYBERSECURITY”
Presented by:
Gerry Poe, CEO and Founder
In 2015 alone, hackers stole the records of
- 11 million people from Premiere Blue Cross
- 10 million people from Excellus BlueCross BlueShield
- 80 million people from Anthem
In contrast, only 22 million people
were directly affected by the
hackers who stole information from
the Office of Personnel
Management.
> Ransomware
> The Internet of Things
> Cyber-espionage
> Cyber theft increases
> Insecure Passwords
WHICH KINDS OF APPLICATIONS ARE
CAUSING THE MOST PROBLEMS?
Download free report on TruShield’s website at:
http://info.trushieldinc.com/2015-annual-cyber-threat-intelligence-report
“Brokers and clients have told us they want an end to unclear and
opaque language, as well as less promotion of off-the-shelf cyber
products by insurers and more joined-up risk management
solutions.”
- Tim Stapleton
Vice President and Cyber Insurance Product Manager, Overseas General Insurance at Chubb
When asked how many staff had completed their information security awareness
program, respondents in a quarter of organizations said that no more than 50% of staff
had done so.
Microsoft Active
Directory is the
foundation of cyber
85% of business and
government
worldwide, as well as
of privileged access
worldwide.
Taken together, the weaknesses
"could potentially compromise the
confidentiality, integrity, and
availability of HHS’ sensitive
information and information
systems," the report warned.
Businesses are constantly under “cyber attack. With the attack surface dramatically increased and a
mature attackers ecosystem, companies have to be ever more vigilant across all their IT assets"
- said Chan.
“Companies are trying to ensure business-as-usual systems are secure and effective
as well as working to drive change through the introduction of new technologies,
greater digitization and mobilization of internal and customer-facing systems.”
- Mark Peters, Managing Director, Protiviti
“Cyber security has
become a C-level issue,”
said Peter Swire, a
professor at Georgia
Tech, who advised
President Barack Obama
on US cyber security
strategy.
“In 2016, we expect boards, audit
committees, executives and
public officials to ask more
pointed questions to ascertain
whether their organization is in a
defensible position”
- KPMG concluded.
The bank is the largest in
Japan, where it faces more
than 80 percent of all cyber
attacks, but also provides
corporate banking services
in the UK.
1) Developing cyberspace capabilities
2) Defending the DOD information network
3) Securing DOD data, and mitigating cyber risks
to DOD missions
4) Preparing to defend U.S. interests from major
cyber attacks
5) Developing cyber options to control cyber
warfare
6) Building international alliances to deter shared
global cyber threats.
Military cyber planning has six goals:
Cyber-security consulting
costs are around $16.5
billion per annum at present,
and are expected to grow to
$23 billion annually by 2019.
As attacks on industrial control
systems (ICSs) become more
frequent and increasingly
sophisticated, defensive strategies
must evolve to keep up.
Fortunately, the tools are getting
better.
Cyber security in process plants:
Recognizing risks, addressing current threats
By leveraging cyber risk management solutions, organizations can significantly
shorten time-to-remediation, increase operational efficiency, strengthen their
security posture, enforce cyber hygiene, improve response readiness, reduce
costs, and ultimately minimize cyber risks.
1) Assume that hackers will ultimately penetrate your infrastructure.
2) Deception can be a useful component of a security strategy.
3) Cyberterrorism has begun.
4) Nearly everyone relies on information-security of 3rd parties for mission critical tasks.
5) Humans are often the weakest point in the security chain.
6) Emerging technologies are obviously great targets.
Six Emerging Cybersecurity Risks You Should Be Aware Of
“The small businesses, I
think, are much more at
risk than they realize,”
- Lisa Traina, CPA/CITP, CGMA,
President of Traina & Associates in
Louisiana.
"Protecting our industry from cyber threats is hard, probably one of the hardest things
we are facing because we do not know what we are facing or for what we have to
prepare“
- Jeff Poole,
Director General of the Civil Air Navigation Services Organization (CANSO)
Dan Trueman, head of cyber for Novae said that the size of broking and
underwriting teams for cyber has not kept pace with the growth of the
market for the risk.
Many SMBs don’t have the time, staff, expertise, or IT resources
to ensure that their businesses are protected, and F-Secure
states, as a result, SMBs face several cybersecurity
vulnerabilities.
“You don’t need autonomous cars to be hacked”
- Alexander Moiseev, Kaspersky’s Managing Director of Europe
A six life cycle program
“Honeywell addresses end-to-end Industrial Cyber
around people, process and technology into a six life
which needs to be continuously initiated” - Akhtar.
1. The Hyper Click
2. The Slick Willie
3. The Boss Hogg
… and so on..
Cyber crime is real. It’s a daily occurrence; behind the scenes and in the
security equipment of every computer network.
Consistent, reliable cyber measures are a necessary mainstay of today’s
business operations.
Summary:
New technologies in service, help support
business-as-usual.
MAKING YOUR BUSINESS TECHNOLOGIES SIMPLY BRILLIANT!
Since 1987, Santa Clarita Consultants, a leading enterprise
provider, delivers business solutions to mid-market
- GERRY POE –
GPoe@scc-co.com
M: 661.645.5825

Mais conteúdo relacionado

Mais procurados

Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Mais procurados (20)

The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 

Destaque

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
Crispy Presentations
 

Destaque (20)

The Endpoint Security Paradox
The Endpoint Security ParadoxThe Endpoint Security Paradox
The Endpoint Security Paradox
 
SecPod Saner
SecPod SanerSecPod Saner
SecPod Saner
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 context
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
 
The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
 
The History of SEO
The History of SEOThe History of SEO
The History of SEO
 
How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)How People Really Hold and Touch (their Phones)
How People Really Hold and Touch (their Phones)
 
Displaying Data
Displaying DataDisplaying Data
Displaying Data
 
Five Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same SlideFive Killer Ways to Design The Same Slide
Five Killer Ways to Design The Same Slide
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
 
Design Your Career 2018
Design Your Career 2018Design Your Career 2018
Design Your Career 2018
 
Upworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The InternetsUpworthy: 10 Ways To Win The Internets
Upworthy: 10 Ways To Win The Internets
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 
The What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignThe What If Technique presented by Motivate Design
The What If Technique presented by Motivate Design
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation
 

Semelhante a Enterprise Cyber Security 2016

Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
Daren Dunkel
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
naveen p
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
Bill Besse
 

Semelhante a Enterprise Cyber Security 2016 (20)

Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Enterprise Cyber Security 2016

  • 1. ENTERPRISE CYBERSECURITY “1 in 6 [of web-based applications] is a malware-related app. Imagine that from the time of floppy disk drives where there would be 15 viruses a month, there is now millions of malware being discovered on a daily basis.” – Bill Chang, CEO of Group Enterprise, SingTel
  • 3. In 2015 alone, hackers stole the records of - 11 million people from Premiere Blue Cross - 10 million people from Excellus BlueCross BlueShield - 80 million people from Anthem In contrast, only 22 million people were directly affected by the hackers who stole information from the Office of Personnel Management.
  • 4. > Ransomware > The Internet of Things > Cyber-espionage > Cyber theft increases > Insecure Passwords
  • 5. WHICH KINDS OF APPLICATIONS ARE CAUSING THE MOST PROBLEMS?
  • 6. Download free report on TruShield’s website at: http://info.trushieldinc.com/2015-annual-cyber-threat-intelligence-report
  • 7. “Brokers and clients have told us they want an end to unclear and opaque language, as well as less promotion of off-the-shelf cyber products by insurers and more joined-up risk management solutions.” - Tim Stapleton Vice President and Cyber Insurance Product Manager, Overseas General Insurance at Chubb
  • 8. When asked how many staff had completed their information security awareness program, respondents in a quarter of organizations said that no more than 50% of staff had done so.
  • 9. Microsoft Active Directory is the foundation of cyber 85% of business and government worldwide, as well as of privileged access worldwide.
  • 10. Taken together, the weaknesses "could potentially compromise the confidentiality, integrity, and availability of HHS’ sensitive information and information systems," the report warned.
  • 11. Businesses are constantly under “cyber attack. With the attack surface dramatically increased and a mature attackers ecosystem, companies have to be ever more vigilant across all their IT assets" - said Chan.
  • 12. “Companies are trying to ensure business-as-usual systems are secure and effective as well as working to drive change through the introduction of new technologies, greater digitization and mobilization of internal and customer-facing systems.” - Mark Peters, Managing Director, Protiviti
  • 13. “Cyber security has become a C-level issue,” said Peter Swire, a professor at Georgia Tech, who advised President Barack Obama on US cyber security strategy.
  • 14. “In 2016, we expect boards, audit committees, executives and public officials to ask more pointed questions to ascertain whether their organization is in a defensible position” - KPMG concluded.
  • 15. The bank is the largest in Japan, where it faces more than 80 percent of all cyber attacks, but also provides corporate banking services in the UK.
  • 16. 1) Developing cyberspace capabilities 2) Defending the DOD information network 3) Securing DOD data, and mitigating cyber risks to DOD missions 4) Preparing to defend U.S. interests from major cyber attacks 5) Developing cyber options to control cyber warfare 6) Building international alliances to deter shared global cyber threats. Military cyber planning has six goals:
  • 17. Cyber-security consulting costs are around $16.5 billion per annum at present, and are expected to grow to $23 billion annually by 2019.
  • 18. As attacks on industrial control systems (ICSs) become more frequent and increasingly sophisticated, defensive strategies must evolve to keep up. Fortunately, the tools are getting better. Cyber security in process plants: Recognizing risks, addressing current threats
  • 19. By leveraging cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security posture, enforce cyber hygiene, improve response readiness, reduce costs, and ultimately minimize cyber risks.
  • 20. 1) Assume that hackers will ultimately penetrate your infrastructure. 2) Deception can be a useful component of a security strategy. 3) Cyberterrorism has begun. 4) Nearly everyone relies on information-security of 3rd parties for mission critical tasks. 5) Humans are often the weakest point in the security chain. 6) Emerging technologies are obviously great targets. Six Emerging Cybersecurity Risks You Should Be Aware Of
  • 21. “The small businesses, I think, are much more at risk than they realize,” - Lisa Traina, CPA/CITP, CGMA, President of Traina & Associates in Louisiana.
  • 22. "Protecting our industry from cyber threats is hard, probably one of the hardest things we are facing because we do not know what we are facing or for what we have to prepare“ - Jeff Poole, Director General of the Civil Air Navigation Services Organization (CANSO)
  • 23. Dan Trueman, head of cyber for Novae said that the size of broking and underwriting teams for cyber has not kept pace with the growth of the market for the risk.
  • 24. Many SMBs don’t have the time, staff, expertise, or IT resources to ensure that their businesses are protected, and F-Secure states, as a result, SMBs face several cybersecurity vulnerabilities.
  • 25. “You don’t need autonomous cars to be hacked” - Alexander Moiseev, Kaspersky’s Managing Director of Europe
  • 26. A six life cycle program “Honeywell addresses end-to-end Industrial Cyber around people, process and technology into a six life which needs to be continuously initiated” - Akhtar.
  • 27. 1. The Hyper Click 2. The Slick Willie 3. The Boss Hogg … and so on..
  • 28. Cyber crime is real. It’s a daily occurrence; behind the scenes and in the security equipment of every computer network. Consistent, reliable cyber measures are a necessary mainstay of today’s business operations. Summary: New technologies in service, help support business-as-usual.
  • 29. MAKING YOUR BUSINESS TECHNOLOGIES SIMPLY BRILLIANT! Since 1987, Santa Clarita Consultants, a leading enterprise provider, delivers business solutions to mid-market - GERRY POE – GPoe@scc-co.com M: 661.645.5825