SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Security
cyber dependency
Managing digital risk in the age of
%
in connected things 2015 to 2025
– IHS Markit
400 increase
Nearly everything is
online and connected
Connectivity + IoT =
everything in the cloud
Over 2 trillion Google
searches per year
By 2025 we will output 62Gb
of data per person per day, vs
500Mb in 2012
The world has changed
Age of Cyber Dependency
2
About 15 million customer
information was stolen from
T-Mobile, after Experian, the
credit-checking company,
was breached
Mirai DDoS attacks rendered
sites like Netflix, Twitter and
Reddit inaccessible, and is
still a threat with source code
circulating hacker forums
WannaCry global attacks
hit the UK’s NHS hardest,
compromising 70,000 devices
like computers, MRI scanners
and blood storage refrigerators
IT Compliance Blog listed
7,073,069 data breaches
and cyber attacks in Jan
2018, the highest number
of any month in any year
2015
WannaCry
Dubbed the biggest malware
attack in history, WannaCry
infected 230,000 computers
across 150 countries when it
was unleashed in May 2017
29 Sep, 2017 www.itpro.co.uk 24 Oct, 2017 www.symantec.com
Petya
Petya has been in existence since 2016 and
is primarily impacting organizations in
Europe. It differs from typical ransomware as
it doesn’t just encrypt files, it also overwrites
and encrypts the master boot record (MBR).
NotPetya
Many of the computers infected by NotPetya
were running older versions of Windows.
NotPetya virus superficially resembles Petya
in several ways, except that it spreads on its
own and encrypts everything.
Cyber Threat (2015 - 2018)
Recent attacks are major
by volume, variety, frequency or reach
3
2016 2017 2018
17 Oct, 2017 www.csoonline
Equifax
Poorly managed digital risk
can cause real harm
300m costs from NotPetya attack Details of national servicemen
and personnel leaked
23 lawsuits with 2.4m affected
in new attack
No one is
immune
Accountability push from regulators,
government and ratings agencies
Targets are not solely chosen
based on return on effort
4
Singapore Ministry of
Defense Cyber BreachMaersk
Digital security high
on CIO agenda
Source: The 2017 CIO Agenda: Seize the Digital Ecosystem Opportunity
Gartner survey
“The risks of not
investing in digital
security are high.
– Gartner Special Report:
Cybersecurity at the Speed of Digital Business
5
Major organizations globally see digital security as
a priority activity and will action on short term
trails and long-term investments.
It was found that digital security is a priority activity for major
organizations, both for short term pilots and trails, as well as for
deeper investments and deployments.
Source: Ransomware Protection: Five Best Practices, July 2017
5 best practices for enterprises to harden their defense against the growing threat of ransomware.
5 actions to manage digital risk
Protect against known ransomware vulnerability
 Correlate exploits to vulnerabilities, and prioritize patching.
 Work with a third-party vulnerability management vendor to scan and patch.
 Assign patch priority based on prioritized patching process (P3) scores.
6
Protect against phishing and watering hole attacks
Protect against malvertisements and downloaders with proper endpoint protection
Ensure that the right network-level protections are in place
Bulletproof your backup and recovery practices05
04
03
02
01
 Use antispam, phishing, and web control tools, consider browser isolation.
 Encourage the human firewall.
 Don’t blame the victims; give them the right tools.
 Go beyond traditional blacklist-based endpoint security for maximum protection.
 Focus on attack surface reduction.
 Detect and block malicious behavior.
 Beef up your network security controls to allow only known good traffic.
 Deploy next-generation firewalls.
 Deploy a solution for automated malware analysis.
 Focus on frequent backups that are free of ransomware.
 Back up and test often.
 Watch backups for malware.
7
Orange
Cybersecurity Solutions
Orange has market-leading
capabilities in cyber security
 OPEX and CAPEX-based services
 Flexible business models to suit your requirements
 Eco-system of partners
Protect against known ransomware vulnerability
Protect against phishing and watering hole attacks
Protect against malvertisements and downloaders with proper endpoint protection
Ensure that the right network-level protections are in place
Bulletproof your backup and recovery practices
Did
you
We can support your management of digital risks
8
know
01
02
03
04
05
Orange
addresses all
5 practices.
Uniquely positioned to
support you
By leveraging on operator DNA
First to know
First hand visibility
of attack signals
from our Internet
backbone.
Security span
B2B customer data
has the same security
services that protect
B2C customers
from massive and
continuous attacks.
9
Perimeter and
end-user security
An end-to-end service provider
Hunt and investigate emerging
threats, fraud and data leaks
Qualify, contain and remediate
attacks
Analyze security events
and detect breaches
Defend and monitor your
critical assets and data
against cyber threats
Prepare your security strategy
and ensure it is working
Crisis management
and remediation
Advanced threat
detection
Audit and consultingThreat intelligence
10
Managed by
experts
Organizational,
technical &
compliance
audit
Penetration
testing Consulting
DDoS
protection
Security Incident
Event Mgmt &
CyberSOC
USB
decontamination
24/7
CyberSOC
Vulnerability
scan
Mobile
Security
Network
and web
security
Data and
application
security
Identity and
Access
Management
Email
protection
24/7SOC
Vulnerability
intelligence
feeds
Cyber
criminality
prevention
CERT tools
CERT
Incident
response
Digital
Forensics
24/7C-SIRT
Crisis
management
Our Solutions
11
Managed by
experts
11:00
Orange incident
response teams
engaged by customers
14:30
Real-time intelligence
feeds confirm global
ransomware
15:30
Orange Epidemiology Lab
communicates Indicators
of Compromise (IoC)
16:00
Remediation
actions shared with
security agencies
14:50
Orange CERT
identifies similarities
with Petya
15:50
Orange CyberSOC injects
IoCs and personalized use
case for each customer
17:00
Orange operational teams
ready to apply emergency
procedures and patches
Thank you for your support during the NotPetya ransomware (crisis).
Especially for your proactivity, timely communications and swift actions
– IT Director, Cosmetics Multinational
“
”
managed by
Orange
cyberdefense
experts
Detect
Real life example
Managing the NotPetya crisis
12
13
Orange
Capabilities
Leading private
CERT
Incident response
Digital forensics
Cyberdefense
Academy
4 CyberSOC that bring together the best expertise in threat analysis 24/7/365
9 SOC around the world monitoring security infra-structure 24/7/365
4 CERT around the world monitoring and responding to events 24/7/365
3 scrubbing centers to mitigate DDoS attacks
Belgium
France
India
Egypt
Mauritius
United States
Canada
Singapore
Malaysia
Poland
14
A global presence of industry-leading capabilities
Our proprietary capabilities
correlated
events/day25bn
1500qualified security
incidents managed/month
500m+malwares
in our database
Patented big data collection and
event correlation engine
Own threat intelligence
database and real-time feeds
Qualification and investigation by multi-
skilled experts based around the globe
15
A business unit
dedicated to security
Orange Cyberdefense
“Orange customers give
above-average marks
for vendor and service
capability satisfaction
– Gartner : Magic Quadrant
for Managed Security Services, Worldwide, 2018
ISO 27001 and NATO certified
60,000+
security assets
managed worldwide
30 years
of experience in securing
critical infrastructures
720
multinational customers
1200+
Cyberdefense experts
16
Summary
17
The next
outbreak is
unavoidable.
Business
disruption isn’t.
18
Just 37% of organizations have a
cyber incident response plan (PwC)
How to prepare to respond to
an attack?
How ready are you to prevent a
potential crisis?
How would your organization,
customers and suppliers cope if
network and systems weredown?
Business, disrupted.
19
Don’t wait – Take action now
 Improve your cyber
resilience across the digital
risk lifecycle
 Secure data throughout its
journey
Embrace Next-Gen
security
Adopt a proactive
mindset
Form the right
alliances
20
 Prepare your organization
for an attack
 Ensure continuous
improvement of your
security
 Access expertise and
collective threat
intelligence
 Effectively orchestrate
technology vendors
Thank you

Mais conteúdo relacionado

Mais de Orange Business Services

World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016Orange Business Services
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...Orange Business Services
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Orange Business Services
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSEOrange Business Services
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Orange Business Services
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logisticsOrange Business Services
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaOrange Business Services
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of miningOrange Business Services
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingOrange Business Services
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?Orange Business Services
 
[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybrideOrange Business Services
 
[whitepaper] Cellular Technology simplifies Smart Water Meter Deployments
[whitepaper] Cellular Technology simplifies Smart Water Meter Deployments [whitepaper] Cellular Technology simplifies Smart Water Meter Deployments
[whitepaper] Cellular Technology simplifies Smart Water Meter Deployments Orange Business Services
 
toutes les communications dans le cloud ! Pourquoi pas vous? #mstechdays
toutes les communications dans le cloud ! Pourquoi pas vous? #mstechdays toutes les communications dans le cloud ! Pourquoi pas vous? #mstechdays
toutes les communications dans le cloud ! Pourquoi pas vous? #mstechdays Orange Business Services
 
[Infographie] Etat des lieux et tendances du cloud
[Infographie] Etat des lieux et tendances du cloud [Infographie] Etat des lieux et tendances du cloud
[Infographie] Etat des lieux et tendances du cloud Orange Business Services
 
les tendances du marché de la collaboration #CollabUEE
les tendances du marché de la collaboration #CollabUEEles tendances du marché de la collaboration #CollabUEE
les tendances du marché de la collaboration #CollabUEEOrange Business Services
 
Infographic flexible connectivity with hybrid network
Infographic flexible connectivity with hybrid networkInfographic flexible connectivity with hybrid network
Infographic flexible connectivity with hybrid networkOrange Business Services
 

Mais de Orange Business Services (20)

World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...
 
Orange Data Centre and Cloud
Orange Data Centre and CloudOrange Data Centre and Cloud
Orange Data Centre and Cloud
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logistics
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital India
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of mining
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shopping
 
[White Paper] Are containers the future ?
[White Paper] Are containers the future ?[White Paper] Are containers the future ?
[White Paper] Are containers the future ?
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?
 
[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride
 
[whitepaper] Cellular Technology simplifies Smart Water Meter Deployments
[whitepaper] Cellular Technology simplifies Smart Water Meter Deployments [whitepaper] Cellular Technology simplifies Smart Water Meter Deployments
[whitepaper] Cellular Technology simplifies Smart Water Meter Deployments
 
toutes les communications dans le cloud ! Pourquoi pas vous? #mstechdays
toutes les communications dans le cloud ! Pourquoi pas vous? #mstechdays toutes les communications dans le cloud ! Pourquoi pas vous? #mstechdays
toutes les communications dans le cloud ! Pourquoi pas vous? #mstechdays
 
[Infographie] Etat des lieux et tendances du cloud
[Infographie] Etat des lieux et tendances du cloud [Infographie] Etat des lieux et tendances du cloud
[Infographie] Etat des lieux et tendances du cloud
 
les tendances du marché de la collaboration #CollabUEE
les tendances du marché de la collaboration #CollabUEEles tendances du marché de la collaboration #CollabUEE
les tendances du marché de la collaboration #CollabUEE
 
Smart city ville intelligente
Smart city ville intelligenteSmart city ville intelligente
Smart city ville intelligente
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
 
Infographic flexible connectivity with hybrid network
Infographic flexible connectivity with hybrid networkInfographic flexible connectivity with hybrid network
Infographic flexible connectivity with hybrid network
 

Último

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 

Último (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Managing digital risk in the age of cyber dependency

  • 2. % in connected things 2015 to 2025 – IHS Markit 400 increase Nearly everything is online and connected Connectivity + IoT = everything in the cloud Over 2 trillion Google searches per year By 2025 we will output 62Gb of data per person per day, vs 500Mb in 2012 The world has changed Age of Cyber Dependency 2
  • 3. About 15 million customer information was stolen from T-Mobile, after Experian, the credit-checking company, was breached Mirai DDoS attacks rendered sites like Netflix, Twitter and Reddit inaccessible, and is still a threat with source code circulating hacker forums WannaCry global attacks hit the UK’s NHS hardest, compromising 70,000 devices like computers, MRI scanners and blood storage refrigerators IT Compliance Blog listed 7,073,069 data breaches and cyber attacks in Jan 2018, the highest number of any month in any year 2015 WannaCry Dubbed the biggest malware attack in history, WannaCry infected 230,000 computers across 150 countries when it was unleashed in May 2017 29 Sep, 2017 www.itpro.co.uk 24 Oct, 2017 www.symantec.com Petya Petya has been in existence since 2016 and is primarily impacting organizations in Europe. It differs from typical ransomware as it doesn’t just encrypt files, it also overwrites and encrypts the master boot record (MBR). NotPetya Many of the computers infected by NotPetya were running older versions of Windows. NotPetya virus superficially resembles Petya in several ways, except that it spreads on its own and encrypts everything. Cyber Threat (2015 - 2018) Recent attacks are major by volume, variety, frequency or reach 3 2016 2017 2018 17 Oct, 2017 www.csoonline
  • 4. Equifax Poorly managed digital risk can cause real harm 300m costs from NotPetya attack Details of national servicemen and personnel leaked 23 lawsuits with 2.4m affected in new attack No one is immune Accountability push from regulators, government and ratings agencies Targets are not solely chosen based on return on effort 4 Singapore Ministry of Defense Cyber BreachMaersk
  • 5. Digital security high on CIO agenda Source: The 2017 CIO Agenda: Seize the Digital Ecosystem Opportunity Gartner survey “The risks of not investing in digital security are high. – Gartner Special Report: Cybersecurity at the Speed of Digital Business 5 Major organizations globally see digital security as a priority activity and will action on short term trails and long-term investments. It was found that digital security is a priority activity for major organizations, both for short term pilots and trails, as well as for deeper investments and deployments.
  • 6. Source: Ransomware Protection: Five Best Practices, July 2017 5 best practices for enterprises to harden their defense against the growing threat of ransomware. 5 actions to manage digital risk Protect against known ransomware vulnerability  Correlate exploits to vulnerabilities, and prioritize patching.  Work with a third-party vulnerability management vendor to scan and patch.  Assign patch priority based on prioritized patching process (P3) scores. 6 Protect against phishing and watering hole attacks Protect against malvertisements and downloaders with proper endpoint protection Ensure that the right network-level protections are in place Bulletproof your backup and recovery practices05 04 03 02 01  Use antispam, phishing, and web control tools, consider browser isolation.  Encourage the human firewall.  Don’t blame the victims; give them the right tools.  Go beyond traditional blacklist-based endpoint security for maximum protection.  Focus on attack surface reduction.  Detect and block malicious behavior.  Beef up your network security controls to allow only known good traffic.  Deploy next-generation firewalls.  Deploy a solution for automated malware analysis.  Focus on frequent backups that are free of ransomware.  Back up and test often.  Watch backups for malware.
  • 8. Orange has market-leading capabilities in cyber security  OPEX and CAPEX-based services  Flexible business models to suit your requirements  Eco-system of partners Protect against known ransomware vulnerability Protect against phishing and watering hole attacks Protect against malvertisements and downloaders with proper endpoint protection Ensure that the right network-level protections are in place Bulletproof your backup and recovery practices Did you We can support your management of digital risks 8 know 01 02 03 04 05 Orange addresses all 5 practices.
  • 9. Uniquely positioned to support you By leveraging on operator DNA First to know First hand visibility of attack signals from our Internet backbone. Security span B2B customer data has the same security services that protect B2C customers from massive and continuous attacks. 9
  • 10. Perimeter and end-user security An end-to-end service provider Hunt and investigate emerging threats, fraud and data leaks Qualify, contain and remediate attacks Analyze security events and detect breaches Defend and monitor your critical assets and data against cyber threats Prepare your security strategy and ensure it is working Crisis management and remediation Advanced threat detection Audit and consultingThreat intelligence 10 Managed by experts
  • 11. Organizational, technical & compliance audit Penetration testing Consulting DDoS protection Security Incident Event Mgmt & CyberSOC USB decontamination 24/7 CyberSOC Vulnerability scan Mobile Security Network and web security Data and application security Identity and Access Management Email protection 24/7SOC Vulnerability intelligence feeds Cyber criminality prevention CERT tools CERT Incident response Digital Forensics 24/7C-SIRT Crisis management Our Solutions 11 Managed by experts
  • 12. 11:00 Orange incident response teams engaged by customers 14:30 Real-time intelligence feeds confirm global ransomware 15:30 Orange Epidemiology Lab communicates Indicators of Compromise (IoC) 16:00 Remediation actions shared with security agencies 14:50 Orange CERT identifies similarities with Petya 15:50 Orange CyberSOC injects IoCs and personalized use case for each customer 17:00 Orange operational teams ready to apply emergency procedures and patches Thank you for your support during the NotPetya ransomware (crisis). Especially for your proactivity, timely communications and swift actions – IT Director, Cosmetics Multinational “ ” managed by Orange cyberdefense experts Detect Real life example Managing the NotPetya crisis 12
  • 14. Leading private CERT Incident response Digital forensics Cyberdefense Academy 4 CyberSOC that bring together the best expertise in threat analysis 24/7/365 9 SOC around the world monitoring security infra-structure 24/7/365 4 CERT around the world monitoring and responding to events 24/7/365 3 scrubbing centers to mitigate DDoS attacks Belgium France India Egypt Mauritius United States Canada Singapore Malaysia Poland 14 A global presence of industry-leading capabilities
  • 15. Our proprietary capabilities correlated events/day25bn 1500qualified security incidents managed/month 500m+malwares in our database Patented big data collection and event correlation engine Own threat intelligence database and real-time feeds Qualification and investigation by multi- skilled experts based around the globe 15
  • 16. A business unit dedicated to security Orange Cyberdefense “Orange customers give above-average marks for vendor and service capability satisfaction – Gartner : Magic Quadrant for Managed Security Services, Worldwide, 2018 ISO 27001 and NATO certified 60,000+ security assets managed worldwide 30 years of experience in securing critical infrastructures 720 multinational customers 1200+ Cyberdefense experts 16
  • 18. The next outbreak is unavoidable. Business disruption isn’t. 18 Just 37% of organizations have a cyber incident response plan (PwC)
  • 19. How to prepare to respond to an attack? How ready are you to prevent a potential crisis? How would your organization, customers and suppliers cope if network and systems weredown? Business, disrupted. 19
  • 20. Don’t wait – Take action now  Improve your cyber resilience across the digital risk lifecycle  Secure data throughout its journey Embrace Next-Gen security Adopt a proactive mindset Form the right alliances 20  Prepare your organization for an attack  Ensure continuous improvement of your security  Access expertise and collective threat intelligence  Effectively orchestrate technology vendors