SlideShare uma empresa Scribd logo
1 de 25
1
2
James Burchell
Senior Sales Engineer
Will your business get hacked?
3
Large
Companies
81%
£600k - £1.5m
Small
Companies
60%
£65k - £115k
Large
Companies
90%
£1.46m -
£3.14m
Small
Companies
75%
£75k - £311k
4
2016: The year of the bigger problems?
5
www.informationisbeautiful.net
6
4,000 data breaches in 3 years
Computing.co.uk
Over 170 law firms investigated in 1
year
Computing.co.uk
All major UK banks and lenders
reported data breaches
Computing.co.uk
¾ of customers would reconsider
using a company
Computing.co.uk
Who’s to blame?
7
Nearly 300,000 customers lost
Computing.co.uk
159,959 accounts compromised
Computing.co.uk
Total cost £40- £45 million
Computing.co.uk
£15 million lost in trading value
Computing.co.uk
BT picked up 40% of unhappy
customers
Computing.co.uk
8
Spending on IT Security and Documenting Security Policies Is Increasing
…Is the TOP Priority For CIOs…
Top 3 priorities
Modernization
innovation
#2
Cloud
mobility
#3
Information Security Is a Priority
For Top Management…
Cyber security /
IT security
#1
…Increasing the Spend On Security Projects in All
Categories
YoY increase in spend in external IT projects
Spending growth expectations in January 2015
Source: PWC Source: Morgan Stanley research
Responses to rising risks
2014 2015
Source: Grant Thornton survey
Note:
1. Large organizations and small businesses consist of enterprises with >250 employees and <50 employees respectively, priority levels for medium sized businesses (50-249 employees) are similar to those for small businesses
(1)
(1)
9
10
Complexity nightmare of Endpoint and Network
Security Analytics
• Multiple incompatible interfaces
• Resource intensive
• Manual integration
• Dependent upon human analysis
• Manual Threat/Incident response
• Extra products that are unaware of each other
• Manual correlation
• Support nightmare
Traditional firewall
Email gateway
Web gateway
NG Firewall
Sandbox
Network Behaviour
Analytics
SIEM
Traditional
anti-malware
Encryption
Web, Device and App
Control
“Next Generation”
Detection
“Next Generation”
Remediation
“Next Generation”
Prevention
11
5.5 million things
connected every day
1
20
15
10
5
Billions
2001 20202014
1.2B
20.8B
6.4B
2016
12
Embedded
systems
Consumer
technologies
Operational
systems
Mobile devices
New security landscape
36%
2015
30%
29%
26%
24%
2014
13% 11% 10%
13
The fragility of privacy
14
Safe Harbour
15
“For many years, we have used
encryption to protect our
customers’ personal data
because we believe it’s the only
way to keep their information
safe.”
Tim Cook, CEO of Apple
16
Up to 35% would Sell company
information
Computing.co.uk
17
Passwords…
1. 123456
2. password
3. 12345678
4. qwerty
5. 12345
6. 123456789
7. football
8. 1234
9. 1234567
10. baseball
11. welcome
12. 1234567890
13. abc123
14. 111111
15. 1qaz2wzx
16. dragon
17. master
18. monkey
19. letmein
20. login
18
“Two things are infinite: The
universe and human stupidity,
and I’m not so sure about the
former.”
- Albert Einstein
19
Understanding vulnerabilities
User error
Flaws
Features
20
Trends
Security Breaches on the rise
21
Firewall
Web
Email
Wireless
Reducing the threat - Protect
Endpoint
Encryption
Server
Mobile
Insight & Analysis
Better Protection
Intelligence Sharing
21
22
IT Controls
Configuration
Visibility
Reducing the threat - Control
23
Reducing the threat - Educate
Passphrases not
passwords
Think before you click
Verify the call
24
Layered defense & automation
Analytics
Next-Gen
Firewall
Wireless
Web
Email
Disk Encryption
UTM
File Encryption
Endpoint
Next-Gen Endpoint
Mobile
Server
Cloud
Intelligence
Centralized Policy
Management
25© Sophos Ltd. All rights reserved.

Mais conteúdo relacionado

Mais procurados

Network-Powered Wi-Fi Analytics
Network-Powered Wi-Fi AnalyticsNetwork-Powered Wi-Fi Analytics
Network-Powered Wi-Fi AnalyticsMike Leibovitz
 
Mobility and BYOD
Mobility and BYODMobility and BYOD
Mobility and BYODJay McBain
 
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...Hacken_Ecosystem
 
Remote facility monitoring and control using IoT
Remote facility monitoring and control using IoTRemote facility monitoring and control using IoT
Remote facility monitoring and control using IoTBernhard Mehl
 
Insurance IoT Digital Report
Insurance IoT Digital ReportInsurance IoT Digital Report
Insurance IoT Digital ReportZsófia Kulcsár
 
Innovation in the cloud - Reducing IP risk for Financial Services
Innovation in the cloud - Reducing IP risk for Financial ServicesInnovation in the cloud - Reducing IP risk for Financial Services
Innovation in the cloud - Reducing IP risk for Financial ServicesAistemos
 
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Praveen Velichety
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Frederike Kaltheuner
 
AllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation CenterAllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation CenterStefaan Top
 
Insurtech Sydney Launch Event 7 September 2016
Insurtech Sydney Launch Event 7 September 2016Insurtech Sydney Launch Event 7 September 2016
Insurtech Sydney Launch Event 7 September 2016Brenton Charnley
 
[infographic] e-signatures in Australia
[infographic] e-signatures in Australia[infographic] e-signatures in Australia
[infographic] e-signatures in AustraliaeSignLive by VASCO
 
[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018Somo
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designAlexandra Deschamps-Sonsino
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - GemaltoHarry Gunns
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities4 All of Us
 

Mais procurados (18)

Network-Powered Wi-Fi Analytics
Network-Powered Wi-Fi AnalyticsNetwork-Powered Wi-Fi Analytics
Network-Powered Wi-Fi Analytics
 
Mobility and BYOD
Mobility and BYODMobility and BYOD
Mobility and BYOD
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
 
Remote facility monitoring and control using IoT
Remote facility monitoring and control using IoTRemote facility monitoring and control using IoT
Remote facility monitoring and control using IoT
 
Insurance IoT Digital Report
Insurance IoT Digital ReportInsurance IoT Digital Report
Insurance IoT Digital Report
 
Innovation in the cloud - Reducing IP risk for Financial Services
Innovation in the cloud - Reducing IP risk for Financial ServicesInnovation in the cloud - Reducing IP risk for Financial Services
Innovation in the cloud - Reducing IP risk for Financial Services
 
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
 
AllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation CenterAllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation Center
 
Insurtech Sydney Launch Event 7 September 2016
Insurtech Sydney Launch Event 7 September 2016Insurtech Sydney Launch Event 7 September 2016
Insurtech Sydney Launch Event 7 September 2016
 
[infographic] e-signatures in Australia
[infographic] e-signatures in Australia[infographic] e-signatures in Australia
[infographic] e-signatures in Australia
 
[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
Privacy in an interconnected world
Privacy in an interconnected worldPrivacy in an interconnected world
Privacy in an interconnected world
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities
 

Destaque

Destaque (10)

Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
El zorro zorro de arriba y el zorro de abajo
El zorro zorro de arriba y el zorro de abajo El zorro zorro de arriba y el zorro de abajo
El zorro zorro de arriba y el zorro de abajo
 
Madon CV shl2
Madon CV shl2Madon CV shl2
Madon CV shl2
 
KStevensonGNINuclearPower
KStevensonGNINuclearPowerKStevensonGNINuclearPower
KStevensonGNINuclearPower
 
айжан кожанова+брендовый магазин+клиенты
айжан кожанова+брендовый магазин+клиентыайжан кожанова+брендовый магазин+клиенты
айжан кожанова+брендовый магазин+клиенты
 
Phrasal verbs
Phrasal verbsPhrasal verbs
Phrasal verbs
 
Historia
HistoriaHistoria
Historia
 
"Blog" para TIC´s
"Blog" para TIC´s"Blog" para TIC´s
"Blog" para TIC´s
 
Tecnologia educativa
Tecnologia educativaTecnologia educativa
Tecnologia educativa
 
ceremonies for teenagers to become adults
ceremonies for teenagers to become adultsceremonies for teenagers to become adults
ceremonies for teenagers to become adults
 

Semelhante a Will Your Business Get Hacked - Hull (Apr 28)

Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes GoldieWill Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes GoldieHBP Systems Ltd
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingPKF Francis Clark
 
IBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Software India
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer ExperiencesJean-Michel Franco
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
The Next BIG Thing in SCM - AI @ CSCMP Barcelona
The Next BIG Thing in SCM - AI @ CSCMP BarcelonaThe Next BIG Thing in SCM - AI @ CSCMP Barcelona
The Next BIG Thing in SCM - AI @ CSCMP BarcelonaThorsten Schroeer
 
Digital Europe: Pushing the frontier, capturing the benefits
Digital Europe: Pushing the frontier, capturing the benefitsDigital Europe: Pushing the frontier, capturing the benefits
Digital Europe: Pushing the frontier, capturing the benefitsMcKinsey & Company
 
Big Data, Big Deal
Big Data,  Big DealBig Data,  Big Deal
Big Data, Big DealPiyush Malik
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Towards a Smarter Data Driven Future
Towards a Smarter Data Driven FutureTowards a Smarter Data Driven Future
Towards a Smarter Data Driven FuturePiyush Malik
 
Smarter analytics101 v2.0.1
Smarter analytics101 v2.0.1Smarter analytics101 v2.0.1
Smarter analytics101 v2.0.1Jenawahl
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Driven Innovation
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Making Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponMaking Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponSCL HUB
 
Making Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponMaking Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponSCL HUB Conference
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIPerry Lea
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 

Semelhante a Will Your Business Get Hacked - Hull (Apr 28) (20)

Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes GoldieWill Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast Briefing
 
IBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day Keynote
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
The Next BIG Thing in SCM - AI @ CSCMP Barcelona
The Next BIG Thing in SCM - AI @ CSCMP BarcelonaThe Next BIG Thing in SCM - AI @ CSCMP Barcelona
The Next BIG Thing in SCM - AI @ CSCMP Barcelona
 
Digital Europe: Pushing the frontier, capturing the benefits
Digital Europe: Pushing the frontier, capturing the benefitsDigital Europe: Pushing the frontier, capturing the benefits
Digital Europe: Pushing the frontier, capturing the benefits
 
Big Data, Big Deal
Big Data,  Big DealBig Data,  Big Deal
Big Data, Big Deal
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Towards a Smarter Data Driven Future
Towards a Smarter Data Driven FutureTowards a Smarter Data Driven Future
Towards a Smarter Data Driven Future
 
Smarter analytics101 v2.0.1
Smarter analytics101 v2.0.1Smarter analytics101 v2.0.1
Smarter analytics101 v2.0.1
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Making Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponMaking Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive Weapon
 
Making Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponMaking Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive Weapon
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Will Your Business Get Hacked - Hull (Apr 28)

  • 1. 1
  • 2. 2 James Burchell Senior Sales Engineer Will your business get hacked?
  • 3. 3 Large Companies 81% £600k - £1.5m Small Companies 60% £65k - £115k Large Companies 90% £1.46m - £3.14m Small Companies 75% £75k - £311k
  • 4. 4 2016: The year of the bigger problems?
  • 6. 6 4,000 data breaches in 3 years Computing.co.uk Over 170 law firms investigated in 1 year Computing.co.uk All major UK banks and lenders reported data breaches Computing.co.uk ¾ of customers would reconsider using a company Computing.co.uk Who’s to blame?
  • 7. 7 Nearly 300,000 customers lost Computing.co.uk 159,959 accounts compromised Computing.co.uk Total cost £40- £45 million Computing.co.uk £15 million lost in trading value Computing.co.uk BT picked up 40% of unhappy customers Computing.co.uk
  • 8. 8 Spending on IT Security and Documenting Security Policies Is Increasing …Is the TOP Priority For CIOs… Top 3 priorities Modernization innovation #2 Cloud mobility #3 Information Security Is a Priority For Top Management… Cyber security / IT security #1 …Increasing the Spend On Security Projects in All Categories YoY increase in spend in external IT projects Spending growth expectations in January 2015 Source: PWC Source: Morgan Stanley research Responses to rising risks 2014 2015 Source: Grant Thornton survey Note: 1. Large organizations and small businesses consist of enterprises with >250 employees and <50 employees respectively, priority levels for medium sized businesses (50-249 employees) are similar to those for small businesses (1) (1)
  • 9. 9
  • 10. 10 Complexity nightmare of Endpoint and Network Security Analytics • Multiple incompatible interfaces • Resource intensive • Manual integration • Dependent upon human analysis • Manual Threat/Incident response • Extra products that are unaware of each other • Manual correlation • Support nightmare Traditional firewall Email gateway Web gateway NG Firewall Sandbox Network Behaviour Analytics SIEM Traditional anti-malware Encryption Web, Device and App Control “Next Generation” Detection “Next Generation” Remediation “Next Generation” Prevention
  • 11. 11 5.5 million things connected every day 1 20 15 10 5 Billions 2001 20202014 1.2B 20.8B 6.4B 2016
  • 15. 15 “For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe.” Tim Cook, CEO of Apple
  • 16. 16 Up to 35% would Sell company information Computing.co.uk
  • 17. 17 Passwords… 1. 123456 2. password 3. 12345678 4. qwerty 5. 12345 6. 123456789 7. football 8. 1234 9. 1234567 10. baseball 11. welcome 12. 1234567890 13. abc123 14. 111111 15. 1qaz2wzx 16. dragon 17. master 18. monkey 19. letmein 20. login
  • 18. 18 “Two things are infinite: The universe and human stupidity, and I’m not so sure about the former.” - Albert Einstein
  • 21. 21 Firewall Web Email Wireless Reducing the threat - Protect Endpoint Encryption Server Mobile Insight & Analysis Better Protection Intelligence Sharing 21
  • 23. 23 Reducing the threat - Educate Passphrases not passwords Think before you click Verify the call
  • 24. 24 Layered defense & automation Analytics Next-Gen Firewall Wireless Web Email Disk Encryption UTM File Encryption Endpoint Next-Gen Endpoint Mobile Server Cloud Intelligence Centralized Policy Management
  • 25. 25© Sophos Ltd. All rights reserved.