Enterprise Cyber Security 2016
-
Upload
santa-clarita-consultants -
Category
Technology
-
view
447 -
download
0
Transcript of Enterprise Cyber Security 2016
ENTERPRISE CYBERSECURITY“1 in 6 [of web-based applications] is a malware-related app. Imagine that from the time of floppy disk drives where there would be 15 viruses a month, there is now millions of malware being discovered on a daily basis.” – Bill Chang, CEO of Group Enterprise, SingTel
“ENTERPRISE CYBERSECURITY”
Presented by: Gerry Poe, CEO and Founder
In 2015 alone, hackers stole the records of - 11 million people from Premiere Blue Cross- 10 million people from Excellus BlueCross BlueShield- 80 million people from Anthem
In contrast, only 22 million people were directly affected by the hackers who stole information from the Office of Personnel Management.
> Ransomware> The Internet of Things> Cyber-espionage> Cyber theft increases> Insecure Passwords
WHICH KINDS OF APPLICATIONS ARE CAUSING THE MOST PROBLEMS?
Download free report on TruShield’s website at:
http://info.trushieldinc.com/2015-annual-cyber-threat-intelligence-report
FREE REPORT
“Brokers and clients have told us they want an end to unclear and opaque language, as well as less promotion of off-the-shelf cyber products by insurers and more joined-up risk management solutions.”- Tim StapletonVice President and Cyber Insurance Product Manager, Overseas General Insurance at Chubb
When asked how many staff had completed their information security awareness program, respondents in a quarter of organizations said that no more than 50% of staff had done so.
Microsoft Active Directory is the foundation of cyber security at 85% of business and government organizations worldwide, as well as the core of privileged access and power worldwide.
Taken together, the weaknesses "could potentially compromise the confidentiality, integrity, and availability of HHS’ sensitive information and information systems," the report warned.
Businesses are constantly under “cyber attack. With the attack surface dramatically increased and a mature attackers ecosystem, companies have to be ever more vigilant across all their IT assets" - said Chan.
“Companies are trying to ensure business-as-usual systems are secure and effective as well as working to drive change through the introduction of new technologies, greater digitization and mobilization of internal and customer-facing systems.” - Mark Peters, Managing Director, Protiviti
“Cyber security has become a C-level issue,” said Peter Swire, a professor at Georgia Tech, who advised President Barack Obama on US cyber security strategy.
“In 2016, we expect boards, audit committees, executives and public officials to ask more pointed questions to ascertain whether their organization is in a defensible position”- KPMG concluded.
The bank is the largest in Japan, where it faces more than 80 percent of all cyber attacks, but also provides corporate banking services in the UK.
1) Developing cyberspace capabilities
2) Defending the DOD information network
3) Securing DOD data, and mitigating cyber risks to DOD missions
4) Preparing to defend U.S. interests from major cyber attacks
5) Developing cyber options to control cyber warfare
6) Building international alliances to deter shared global cyber threats.
Military cyber planning has six goals:
Cyber-security consulting costs are around $16.5 billion per annum at present, and are expected to grow to $23 billion annually by 2019.
As attacks on industrial control systems (ICSs) become more frequent and increasingly sophisticated, defensive strategies must evolve to keep up.
Fortunately, the tools are getting better.
Cyber security in process plants: Recognizing risks, addressing current threats
By leveraging cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security posture, enforce cyber hygiene, improve response readiness, reduce costs, and ultimately minimize cyber risks.
1) Assume that hackers will ultimately penetrate your infrastructure. 2) Deception can be a useful component of a security strategy.3) Cyberterrorism has begun.4) Nearly everyone relies on information-security of 3rd parties for mission critical tasks.5) Humans are often the weakest point in the security chain.6) Emerging technologies are obviously great targets.
Six Emerging Cybersecurity Risks You Should Be Aware Of
“The small businesses, I think, are much more at risk than they realize,” - Lisa Traina, CPA/CITP, CGMA, President of Traina & Associates in Louisiana.
"Protecting our industry from cyber threats is hard, probably one of the hardest things we are facing because we do not know what we are facing or for what we have to prepare“ - Jeff Poole, Director General of the Civil Air Navigation Services Organization (CANSO)
Dan Trueman, head of cyber for Novae said that the size of broking and underwriting teams for cyber has not kept pace with the growth of the market for the risk.
Many SMBs don’t have the time, staff, expertise, or IT resources to ensure that their businesses are protected, and F-Secure states, as a result, SMBs face several cybersecurity vulnerabilities.
“You don’t need autonomous cars to be hacked” - Alexander Moiseev, Kaspersky’s Managing Director of Europe
A six life cycle program“Honeywell addresses end-to-end Industrial Cyber Security Solutions around people, process and technology into a six life cycle program, all of which needs to be continuously initiated” - Akhtar.
1. The Hyper Click2. The Slick Willie3. The Boss Hogg… and so on..
Cyber crime is real. It’s a daily occurrence; behind the scenes and in the security equipment of every computer network.
Consistent, reliable cyber measures are a necessary mainstay of today’s business operations.
Summary:
New technologies in service, help support business-as-usual.
MAKING YOUR BUSINESS TECHNOLOGIES SIMPLY BRILLIANT!
Since 1987, Santa Clarita Consultants, a leading enterprise systems technology provider, delivers business solutions to
mid-market manufacturers and distributors.- GERRY POE –
[email protected]: 661.645.5825