IT Security Summit 2016

3
IT Security Summit 2016 Protect. Defend. Innovate. “Securing the cyberspace from the unknown” What is CyberSecurity? The protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. What is a cybercrime? Conducted by individuals working alone, or in organized groups, intent on extracting money, data or causing disruption, cyber crime can take many forms, including the acquisition of credit/debit card data and intellectual property, and What is data breach? A security incident in which sensitive, protected or confidential dat a is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so WHAT?

Transcript of IT Security Summit 2016

Page 1: IT Security Summit 2016

IT Security Summit 2016

Protect. Defend. Innovate.

“Securing the cyberspace from the unknown”

What is CyberSecurity?

• The protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

What is a cybercrime?

• Conducted by individuals working alone, or in organized groups, intent on extracting money, data or causing disruption, cyber crime can take many forms, including the acquisition of credit/debit card data and intellectual property, and impairing the operations of a website or service.

What is data breach?

• A security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so

WHAT?

Page 2: IT Security Summit 2016

IT Security Summit 2016

Protect. Defend. Innovate.

“Securing the cyberspace from the unknown”

How do I protect my business from cyber attacks?

• Conduct a Security and Self Risk Assessment

• Perform Policy Review and Employee Education

• Preform Penetration Testing & Vulnerability Scanning

How does cyber attacks compromise your network?

• Settles into a system• Tries to hide• Searches out network

vulnerabilities• Disables network security

measures• Infects more endpoints and

other devices• Calls back to command-and-

control (CnC) servers• Waits for instructions to

start extracting data from the network

How do I respond to data breaches?

• Implement an Incident response plan

• Limit data exposure• Notify Business

partners• Manage 3rd party

contracts

HOW?

Page 3: IT Security Summit 2016

IT Security Summit 2016

Protect. Defend. Innovate.

“Securing the cyberspace from the unknown”IT Security FACTS 1 2

3 4 5

Living in a digital service dependent world heightens the importance of securing all information in the cyberspace. Be informed, and updated to help secure the cyberspace

YOU ARE A TARGET!Be pro-active! Continuously connect with the cyberspace security experts through the IT Security Summit 2016.