Enterprise Cyber Security 2016

29
ENTERPRISE CYBERSECURITY “1 in 6 [of web-based applications] is a malware-related app. Imagine that from the time of floppy disk drives where there would be 15 viruses a month, there is now millions of malware being discovered on a daily basis.” – Bill Chang, CEO of Group Enterprise, SingTel

Transcript of Enterprise Cyber Security 2016

Page 1: Enterprise Cyber Security 2016

ENTERPRISE CYBERSECURITY“1 in 6 [of web-based applications] is a malware-related app. Imagine that from the time of floppy disk drives where there would be 15 viruses a month, there is now millions of malware being discovered on a daily basis.” – Bill Chang, CEO of Group Enterprise, SingTel

Page 2: Enterprise Cyber Security 2016

“ENTERPRISE CYBERSECURITY”

Presented by: Gerry Poe, CEO and Founder

Page 3: Enterprise Cyber Security 2016

In 2015 alone, hackers stole the records of - 11 million people from Premiere Blue Cross- 10 million people from Excellus BlueCross BlueShield- 80 million people from Anthem

In contrast, only 22 million people were directly affected by the hackers who stole information from the Office of Personnel Management.

Page 4: Enterprise Cyber Security 2016

> Ransomware> The Internet of Things> Cyber-espionage> Cyber theft increases> Insecure Passwords

Page 5: Enterprise Cyber Security 2016

WHICH KINDS OF APPLICATIONS ARE CAUSING THE MOST PROBLEMS?

Page 6: Enterprise Cyber Security 2016

Download free report on TruShield’s website at:

http://info.trushieldinc.com/2015-annual-cyber-threat-intelligence-report

FREE REPORT

Page 7: Enterprise Cyber Security 2016

“Brokers and clients have told us they want an end to unclear and opaque language, as well as less promotion of off-the-shelf cyber products by insurers and more joined-up risk management solutions.”- Tim StapletonVice President and Cyber Insurance Product Manager, Overseas General Insurance at Chubb

Page 8: Enterprise Cyber Security 2016

When asked how many staff had completed their information security awareness program, respondents in a quarter of organizations said that no more than 50% of staff had done so.

Page 9: Enterprise Cyber Security 2016

Microsoft Active Directory is the foundation of cyber security at 85% of business and government organizations worldwide, as well as the core of privileged access and power worldwide.

Page 10: Enterprise Cyber Security 2016

Taken together, the weaknesses "could potentially compromise the confidentiality, integrity, and availability of HHS’ sensitive information and information systems," the report warned.

Page 11: Enterprise Cyber Security 2016

Businesses are constantly under “cyber attack. With the attack surface dramatically increased and a mature attackers ecosystem, companies have to be ever more vigilant across all their IT assets" - said Chan.

Page 12: Enterprise Cyber Security 2016

“Companies are trying to ensure business-as-usual systems are secure and effective as well as working to drive change through the introduction of new technologies, greater digitization and mobilization of internal and customer-facing systems.” - Mark Peters, Managing Director, Protiviti

Page 13: Enterprise Cyber Security 2016

“Cyber security has become a C-level issue,” said Peter Swire, a professor at Georgia Tech, who advised President Barack Obama on US cyber security strategy.

Page 14: Enterprise Cyber Security 2016

“In 2016, we expect boards, audit committees, executives and public officials to ask more pointed questions to ascertain whether their organization is in a defensible position”- KPMG concluded.

Page 15: Enterprise Cyber Security 2016

The bank is the largest in Japan, where it faces more than 80 percent of all cyber attacks, but also provides corporate banking services in the UK.

Page 16: Enterprise Cyber Security 2016

1) Developing cyberspace capabilities

2) Defending the DOD information network

3) Securing DOD data, and mitigating cyber risks to DOD missions

4) Preparing to defend U.S. interests from major cyber attacks

5) Developing cyber options to control cyber warfare

6) Building international alliances to deter shared global cyber threats.

Military cyber planning has six goals:

Page 17: Enterprise Cyber Security 2016

Cyber-security consulting costs are around $16.5 billion per annum at present, and are expected to grow to $23 billion annually by 2019.

Page 18: Enterprise Cyber Security 2016

As attacks on industrial control systems (ICSs) become more frequent and increasingly sophisticated, defensive strategies must evolve to keep up.

Fortunately, the tools are getting better.

Cyber security in process plants: Recognizing risks, addressing current threats

Page 19: Enterprise Cyber Security 2016

By leveraging cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security posture, enforce cyber hygiene, improve response readiness, reduce costs, and ultimately minimize cyber risks.

Page 20: Enterprise Cyber Security 2016

1) Assume that hackers will ultimately penetrate your infrastructure. 2) Deception can be a useful component of a security strategy.3) Cyberterrorism has begun.4) Nearly everyone relies on information-security of 3rd parties for mission critical tasks.5) Humans are often the weakest point in the security chain.6) Emerging technologies are obviously great targets.

Six Emerging Cybersecurity Risks You Should Be Aware Of

Page 21: Enterprise Cyber Security 2016

“The small businesses, I think, are much more at risk than they realize,” - Lisa Traina, CPA/CITP, CGMA, President of Traina & Associates in Louisiana.

Page 22: Enterprise Cyber Security 2016

"Protecting our industry from cyber threats is hard, probably one of the hardest things we are facing because we do not know what we are facing or for what we have to prepare“ - Jeff Poole, Director General of the Civil Air Navigation Services Organization (CANSO)

Page 23: Enterprise Cyber Security 2016

Dan Trueman, head of cyber for Novae said that the size of broking and underwriting teams for cyber has not kept pace with the growth of the market for the risk.

Page 24: Enterprise Cyber Security 2016

Many SMBs don’t have the time, staff, expertise, or IT resources to ensure that their businesses are protected, and F-Secure states, as a result, SMBs face several cybersecurity vulnerabilities.

Page 25: Enterprise Cyber Security 2016

“You don’t need autonomous cars to be hacked” - Alexander Moiseev, Kaspersky’s Managing Director of Europe

Page 26: Enterprise Cyber Security 2016

A six life cycle program“Honeywell addresses end-to-end Industrial Cyber Security Solutions around people, process and technology into a six life cycle program, all of which needs to be continuously initiated” - Akhtar.

Page 27: Enterprise Cyber Security 2016

1. The Hyper Click2. The Slick Willie3. The Boss Hogg… and so on..

Page 28: Enterprise Cyber Security 2016

Cyber crime is real. It’s a daily occurrence; behind the scenes and in the security equipment of every computer network.

Consistent, reliable cyber measures are a necessary mainstay of today’s business operations.

Summary:

New technologies in service, help support business-as-usual.

Page 29: Enterprise Cyber Security 2016

MAKING YOUR BUSINESS TECHNOLOGIES SIMPLY BRILLIANT!

Since 1987, Santa Clarita Consultants, a leading enterprise systems technology provider, delivers business solutions to

mid-market manufacturers and distributors.- GERRY POE –

[email protected]: 661.645.5825