SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Your cyber security
roadmap
• Introduction
• Bevan Sinclair - Practice Manager, Cloud Design and Integration, Intergen
• Sven Ross - Chief Executive Officer, Diamond Cyber
• Mark Blower - National Business Manager – Networks and Security, Empired
• Why are we vulnerable to a cyber attack?
• What can we do to mitigate the threat?
• How the threat landscape is changing
• How Intergen can help
• Free offering and competition
• Questions
Agenda
Introduction
Why are we here?
• Business beats with a digital heart
• Rates of cyber crime increasing exponentially
• Cyber crime is highly lucrative and largely anonymous
• Attacks are becoming increasingly sophisticated, targeted and
persistent risk profiles are ever increasing
We need to stay one step ahead
Why are we vulnerable to cyber attack?
The face of cyber crime has changed
• A commercial venture with low point of entry
• Anonymous ransomware
• Large scale, industrial approach to exploitation
• New threats by the minute
Why are we so vulnerable to cyber attack
• The manipulation of people and
technology to do something other
than its original purpose
• The intention behind the hacking
dictates whether it is malicious or not
• Effective law enforcement and
prevention of cyber crime is difficult for
many reasons
What is hacking?
In business we have competing demands:
• Market share and profitability
• Responding to customer demand
• Innovating your products and services
IT systems are connected together like never before.
Truly effective cyber security management requires a broader view
than just IT.
Where to find the time to ‘be secure’?
Competing demands vie for our attention
Source: Diamond Cyber
Time is a key construct of vulnerability to malicious activity.
• The competing demands of business vie for all our time.
• The IT teams’ available time is split between new initiatives,
innovation, break/fix, proactive management and more.
For the cyber criminal time is their most valuable asset.
• A persistent threat attacker is spending more time trying to break in
than you are trying to prevent it.
The attacker may be more dedicated
Source: Diamond Cyber
The attacker may be more dedicated
Time spent on defensive
measures, limited by cost,
prioritised by uptime.
Level of security
achieved,
measured in time-
to-compromise.
Efficiency
Hacker:
Time invested in achieving
compromising, limited by
motivation. Example: Criminal
No compromise
Compromise
Hacker:
Time invested in achieving
compromising, limited by
motivation. Example: State
This is why a realistic threat
should dictate defensive
spend, and why defensive
efficiency (strategy) is
important
Source: Diamond Cyber
To a large extent, we are vulnerable due to
the compliance driven approach to security.
• Some of us have an annual audit for security
• Sometimes security checks are done outside of
audits
Hackers do not wait for your yearly security
audits to create new attacks!
Process; a help and a hindrance
Verify
Controls
Apply
Controls
Exploit
Vulnerability
Identify
Vulnerability
6 Months
6 Months
Source: Diamond Cyber
Advanced
• Targeted, coordinated,
purposeful
Persistent
• Month after month, year
after year
Threat
• Person(s) with intent,
opportunity and capability
The Cyber Kill Chain 1. Reconnaissance
Harvesting email addresses,
conference information, etc.
7. Actions on objective
With ‘hands on’ access the
intruders accomplish their goal
2. Weaponisation
Couple exploit with
backdoor into a payload.
3. Delivery
Delivery of exploit to victim.
Email, web, USB, etc.
6. Command and control
Command channel for remote
manipulation
4. Installation
Installing malware on the asset
5. Exploitation
Exploit a vulnerability to
execute code on the asset
Source: Diamond Cyber
What can we do to mitigate the threat?
Understand the enemy
• Persistent, advanced and human-based. Actively probing for weakness
• Multiple threat vectors, changing daily
• Likely spending more time trying to attack you than you are defending
Identify your risks and exposure
• Where are your information assets and how protected are they?
• Where are your weaknesses?
Build a defensive strategy and execute upon it
• Plan to protect what matters the most
Continuously validate its effectiveness
• Optimise your defences by probing for weakness
What should businesses do?
What should business do?
Develop a cyber program
• Identify business/mission objectives and high-level organisational priorities
• Determine the scope of systems and assets that support the selected business line or process
• Identify related systems and assets, regulatory requirements, and overall risk approach
• Identify the Threat Groups most likely to target the organisation and understand why.
Prioritise,
Scope &
Orient
• Identify a framework to reference cyber control definitions (NIST, COBIT, ISO 27001, CIS-CSC)
• Develops a Current Profile by indicating what cyber controls currently exist in the business
• Determine the maturity of controls
Create
Current State
Profile
• Assessment is guided by the organisation’s overall risk management process or previous risk
assessment activities.
• Analyse the operational environment in order to discern the likelihood of a cybersecurity event
and the impact that the event could have on the organisation.
• Identify the Most Likely and Most Dangerous threat scenarios which could occur.
Conduct Risk
Assessment
Cyber program development
• Create a Target Profile that focuses on the assessment of the identified Controls describing the
organisation’s desired cybersecurity outcomes
• Consider influences and requirements of external stakeholders such as sector entities, customers,
and business partners when creating a Target Profile
Create Target
State Profile
• Compare the Current Profile and the Target Profile to determine gaps
• Create a prioritised action plan to address those gaps that draws upon mission drivers, a
cost/benefit analysis, and understanding of risk to achieve the outcomes in the Target Profile
• Determine resources necessary to address the gaps
Determine &
Prioritise
Gaps
• Determine which actions to take in regards to the gaps, if any, identified in the previous step
• Monitor the cybersecurity practices against the Target Profile
Implement
Action Plan
Cyber program development
Cyber program development – Core Functions
Identify
Protect
DetectRespond
Recover
• Identify the components of your business that require
protection and how this is achieved.
• Implement process and technology to protect your
information assets.
• Build capability to detect when an attack may occur, is
occurring or has occurred.
• Establish people, process and technology to respond to
cyber incidents.
• Create a cyber resilient business that is capable of
recovering from cyber incidents.
How the threat landscape is changing
“Only two things are infinite, the universe and human
stupidity, and I'm not sure about the former” Albert Einstein
• The traditional firewall and E-mail
protection is dead
• Next generation firewalls (UTMs)
and advanced mail protection are a
step in the right direction
• We need threat analytics and real
time protection
• Considerations for bespoke vs
unified solutions
Perimeter protection
Antivirus technology is dated and
not effective
We need:
• Real time protection
• Ways to enforce corporate
policy to the remote worker
• Mobile device protection
Antivirus and antimalware
• We can’t consider the wired
network is safe anymore
• Provide accessibility to the
correct people
• Prepare yourself for IoT
Protect your network
Application Control Devices (ACDs)
provide visibility of who accesses what
and when.
They enable us to
• Protect the application in any
location
• Provision accessibility for the correct
user and block others
Protect your application
Insight is crucial to effective
management of the threat landscape
No visibility = minimal benefit
Unify systems
Security Incident and Event
Management
Visibility and monitoring
How Intergen can help
How Intergen can help
Audit
and
compliance
Enhancement
and
remediation
Threat response
and
containment
Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanningVladimir Jirasek
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security ResilienceJoel Aleburu
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?John Gilligan
 

Was ist angesagt? (20)

"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber security
Cyber securityCyber security
Cyber security
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 

Ähnlich wie Your cyber security webinar

Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesHinne Hettema
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security BreakfastRackspace
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business ContinuityStephen Cobb
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISSaazan Shrestha
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptxBoni Yeamin
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael JosephiuvoTechnologies
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Knoldus Inc.
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers Precisely
 

Ähnlich wie Your cyber security webinar (20)

What to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breachWhat to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breach
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
Incident response
Incident responseIncident response
Incident response
 

Mehr von Intergen

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Intergen
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral TeamsIntergen
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personalIntergen
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesIntergen
 
Intergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplaceIntergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplaceIntergen
 
Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)Intergen
 
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)Intergen
 
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)Intergen
 
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen InterconnectIntergen
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookIntergen
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceIntergen
 
Dynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureDynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureIntergen
 

Mehr von Intergen (20)

Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...Creating intelligent content: How to automate personalised, one-to-one market...
Creating intelligent content: How to automate personalised, one-to-one market...
 
Taming the feral Teams
Taming the feral TeamsTaming the feral Teams
Taming the feral Teams
 
Customer Insights: It's time to get personal
Customer Insights: It's time to get personalCustomer Insights: It's time to get personal
Customer Insights: It's time to get personal
 
Working Remotely with Microsoft Technologies
Working Remotely with Microsoft TechnologiesWorking Remotely with Microsoft Technologies
Working Remotely with Microsoft Technologies
 
Intergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplaceIntergen Convergence 2017 - Digital workplace
Intergen Convergence 2017 - Digital workplace
 
Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)Intergen Convergence 2017 - Customer engagement (Toyota)
Intergen Convergence 2017 - Customer engagement (Toyota)
 
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)Intergen Convergence 2017 - Customer engagement (Green Cross Health)
Intergen Convergence 2017 - Customer engagement (Green Cross Health)
 
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
Intergen Convergence 2017 - Customer engagement (Dynamic Controls)
 
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
Intergen Convergence 2017 - Business transformation across the enterprise (NZ...
 
Intergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journeyIntergen Convergence 2017 - Bringing your people on the change journey
Intergen Convergence 2017 - Bringing your people on the change journey
 
Intergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformationIntergen Convergence 2017 - Why digital transformation
Intergen Convergence 2017 - Why digital transformation
 
Intergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterpriseIntergen Convergence 2017 - Unleash your digital enterprise
Intergen Convergence 2017 - Unleash your digital enterprise
 
Intergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is hereIntergen Convergence 2017 - The future is here
Intergen Convergence 2017 - The future is here
 
Intergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safeIntergen Convergence 2017 - Keeping safe, staying safe
Intergen Convergence 2017 - Keeping safe, staying safe
 
Intergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer EngagementIntergen Convergence 2017 - Customer Engagement
Intergen Convergence 2017 - Customer Engagement
 
Intergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important assetIntergen Convergence 2017 - Data as your most important asset
Intergen Convergence 2017 - Data as your most important asset
 
Intergen Interconnect
Intergen InterconnectIntergen Interconnect
Intergen Interconnect
 
Dynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first lookDynamics Day 2016: Microsoft Dynamics 365 first look
Dynamics Day 2016: Microsoft Dynamics 365 first look
 
Dynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project ServiceDynamics Day 2016: CRM Field Service and Project Service
Dynamics Day 2016: CRM Field Service and Project Service
 
Dynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the futureDynamics Day 2016: looking to the future
Dynamics Day 2016: looking to the future
 

Kürzlich hochgeladen

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Kürzlich hochgeladen (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Your cyber security webinar

  • 2. • Introduction • Bevan Sinclair - Practice Manager, Cloud Design and Integration, Intergen • Sven Ross - Chief Executive Officer, Diamond Cyber • Mark Blower - National Business Manager – Networks and Security, Empired • Why are we vulnerable to a cyber attack? • What can we do to mitigate the threat? • How the threat landscape is changing • How Intergen can help • Free offering and competition • Questions Agenda
  • 3. Introduction Why are we here? • Business beats with a digital heart • Rates of cyber crime increasing exponentially • Cyber crime is highly lucrative and largely anonymous • Attacks are becoming increasingly sophisticated, targeted and persistent risk profiles are ever increasing We need to stay one step ahead
  • 4. Why are we vulnerable to cyber attack?
  • 5. The face of cyber crime has changed • A commercial venture with low point of entry • Anonymous ransomware • Large scale, industrial approach to exploitation • New threats by the minute Why are we so vulnerable to cyber attack
  • 6. • The manipulation of people and technology to do something other than its original purpose • The intention behind the hacking dictates whether it is malicious or not • Effective law enforcement and prevention of cyber crime is difficult for many reasons What is hacking?
  • 7. In business we have competing demands: • Market share and profitability • Responding to customer demand • Innovating your products and services IT systems are connected together like never before. Truly effective cyber security management requires a broader view than just IT. Where to find the time to ‘be secure’? Competing demands vie for our attention Source: Diamond Cyber
  • 8. Time is a key construct of vulnerability to malicious activity. • The competing demands of business vie for all our time. • The IT teams’ available time is split between new initiatives, innovation, break/fix, proactive management and more. For the cyber criminal time is their most valuable asset. • A persistent threat attacker is spending more time trying to break in than you are trying to prevent it. The attacker may be more dedicated Source: Diamond Cyber
  • 9. The attacker may be more dedicated Time spent on defensive measures, limited by cost, prioritised by uptime. Level of security achieved, measured in time- to-compromise. Efficiency Hacker: Time invested in achieving compromising, limited by motivation. Example: Criminal No compromise Compromise Hacker: Time invested in achieving compromising, limited by motivation. Example: State This is why a realistic threat should dictate defensive spend, and why defensive efficiency (strategy) is important Source: Diamond Cyber
  • 10. To a large extent, we are vulnerable due to the compliance driven approach to security. • Some of us have an annual audit for security • Sometimes security checks are done outside of audits Hackers do not wait for your yearly security audits to create new attacks! Process; a help and a hindrance Verify Controls Apply Controls Exploit Vulnerability Identify Vulnerability 6 Months 6 Months Source: Diamond Cyber
  • 11. Advanced • Targeted, coordinated, purposeful Persistent • Month after month, year after year Threat • Person(s) with intent, opportunity and capability The Cyber Kill Chain 1. Reconnaissance Harvesting email addresses, conference information, etc. 7. Actions on objective With ‘hands on’ access the intruders accomplish their goal 2. Weaponisation Couple exploit with backdoor into a payload. 3. Delivery Delivery of exploit to victim. Email, web, USB, etc. 6. Command and control Command channel for remote manipulation 4. Installation Installing malware on the asset 5. Exploitation Exploit a vulnerability to execute code on the asset Source: Diamond Cyber
  • 12. What can we do to mitigate the threat?
  • 13. Understand the enemy • Persistent, advanced and human-based. Actively probing for weakness • Multiple threat vectors, changing daily • Likely spending more time trying to attack you than you are defending Identify your risks and exposure • Where are your information assets and how protected are they? • Where are your weaknesses? Build a defensive strategy and execute upon it • Plan to protect what matters the most Continuously validate its effectiveness • Optimise your defences by probing for weakness What should businesses do?
  • 14. What should business do? Develop a cyber program
  • 15. • Identify business/mission objectives and high-level organisational priorities • Determine the scope of systems and assets that support the selected business line or process • Identify related systems and assets, regulatory requirements, and overall risk approach • Identify the Threat Groups most likely to target the organisation and understand why. Prioritise, Scope & Orient • Identify a framework to reference cyber control definitions (NIST, COBIT, ISO 27001, CIS-CSC) • Develops a Current Profile by indicating what cyber controls currently exist in the business • Determine the maturity of controls Create Current State Profile • Assessment is guided by the organisation’s overall risk management process or previous risk assessment activities. • Analyse the operational environment in order to discern the likelihood of a cybersecurity event and the impact that the event could have on the organisation. • Identify the Most Likely and Most Dangerous threat scenarios which could occur. Conduct Risk Assessment Cyber program development
  • 16. • Create a Target Profile that focuses on the assessment of the identified Controls describing the organisation’s desired cybersecurity outcomes • Consider influences and requirements of external stakeholders such as sector entities, customers, and business partners when creating a Target Profile Create Target State Profile • Compare the Current Profile and the Target Profile to determine gaps • Create a prioritised action plan to address those gaps that draws upon mission drivers, a cost/benefit analysis, and understanding of risk to achieve the outcomes in the Target Profile • Determine resources necessary to address the gaps Determine & Prioritise Gaps • Determine which actions to take in regards to the gaps, if any, identified in the previous step • Monitor the cybersecurity practices against the Target Profile Implement Action Plan Cyber program development
  • 17. Cyber program development – Core Functions Identify Protect DetectRespond Recover • Identify the components of your business that require protection and how this is achieved. • Implement process and technology to protect your information assets. • Build capability to detect when an attack may occur, is occurring or has occurred. • Establish people, process and technology to respond to cyber incidents. • Create a cyber resilient business that is capable of recovering from cyber incidents.
  • 18. How the threat landscape is changing “Only two things are infinite, the universe and human stupidity, and I'm not sure about the former” Albert Einstein
  • 19. • The traditional firewall and E-mail protection is dead • Next generation firewalls (UTMs) and advanced mail protection are a step in the right direction • We need threat analytics and real time protection • Considerations for bespoke vs unified solutions Perimeter protection
  • 20. Antivirus technology is dated and not effective We need: • Real time protection • Ways to enforce corporate policy to the remote worker • Mobile device protection Antivirus and antimalware
  • 21. • We can’t consider the wired network is safe anymore • Provide accessibility to the correct people • Prepare yourself for IoT Protect your network
  • 22. Application Control Devices (ACDs) provide visibility of who accesses what and when. They enable us to • Protect the application in any location • Provision accessibility for the correct user and block others Protect your application
  • 23. Insight is crucial to effective management of the threat landscape No visibility = minimal benefit Unify systems Security Incident and Event Management Visibility and monitoring
  • 25. How Intergen can help Audit and compliance Enhancement and remediation Threat response and containment