Enabling Personal Internet Security

6
© LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

description

Enabling Personal Internet Security. Dave Martin Managing Security Consultant. Agenda. 30 Second Introduction Current and Emerging Cyberspace Threats Addressing the Threats – Three Pronged Approach. 30 Second Introduction. LogicaCMG Worldwide business support company - PowerPoint PPT Presentation

Transcript of Enabling Personal Internet Security

Page 1: Enabling Personal Internet Security

© LogicaCMG 2006. All rights reserved

Enabling Personal Internet Security

Dave Martin

Managing Security Consultant

Page 2: Enabling Personal Internet Security

2Privacy in Cyberspace

Agenda

30 SecondIntroduction

Current and Emerging Cyberspace Threats

Addressing the Threats – Three Pronged Approach

Page 3: Enabling Personal Internet Security

3Privacy in Cyberspace

30 Second Introduction

• LogicaCMG

– Worldwide business support company

– 40,000 employees worldwide

– 250+ full time security consultants

– Full boardroom to bytes security service

Page 4: Enabling Personal Internet Security

4Privacy in Cyberspace

Current and Emerging Cyberspace Threats

• Consumers are exposed to fraud potential

• Viruses, Worms, Trojans, Letter Bombs and more…

• Unacceptable behaviour on-line

• Phishing already a significant problems for consumers

• Penetration of wireless networks

• E-mail interception

• Spear-phishing

Page 5: Enabling Personal Internet Security

5Privacy in Cyberspace

Education

Government websitesISP campaignsVendor adviceIndustry advice

Tools

Anti-virus & Anti-SpamFirewalls

Patch levelsSecured wireless routers

Global co-operation

Cross border co-operation

Education

Targeted advice to publicTailored advice to public

Tools

Secure e-mailIE7

Behavioural Analytics

Global co-operation

MoU between countries

Addressing the Threats – Three Pronged Approach

Page 6: Enabling Personal Internet Security

6Privacy in Cyberspace

Summary

• Government to sponsor public awareness

• ISPs to provide customers with toolkit

• Businesses to safeguard their customers’ information

• Consumers to use the tools available

Coherent - Cost-effective - Simple