How to Protect your Assets from Cyber Attacks

Click here to load reader

  • date post

    13-Apr-2017
  • Category

    Technology

  • view

    84
  • download

    2

Embed Size (px)

Transcript of How to Protect your Assets from Cyber Attacks

PowerPoint Presentation

How to Protect Your Assets From Cyber Attacks

18TH Jan 2017PRESENTED BY:Sean Ball, Forfusion

Good morning everyone and thank you for joining us this here at The Core for this event, Cyber-Attacks: Why they happen and how to stop them.My name is Sean Ball and I head up marketing at Forfusion, the IT and business consultancy that have put this event on here for you today. Please feel free to connect with me on Linkedin and on Twitter.

Community HashtagHow to Protect Your Assets from Cyber Attacks#CyberSecurityNE

You may have seen in the news recently that Newcastle and surrounding areas top the national table for cyber-security problems. If I only our football teams could do as well in their respective leagues.According to Censuswide, 93% of businesses with over 200 employees have suffered a data breach in the last year or so.Barely a week seems to go by without a major data breach being reported in the news. Including recently, the North Easts only FTSE 100 company.And these are only the ones we hear about! What about the ones that no-one knows have actually taken place? Now thats a scary thought, isnt it?.

IT is a risky business

Its all about Risk MitigationHow to Protect Your Assets from Cyber Attacks

What we do at Forfusion is mitigate risk. Its our mission. IT is a risky business. The pressure on the IT department is huge,. The best way to describe the pressure of change is digitsation, meaning the transformation of business. Every business has become digital business. The digital economy, is the economy.DigitisationCan anyone think of a business that doesnt rely on technology to function?Were seeing more and more customers invite us because they feel pressured to deliver business outcomes. They are overwhelmed because in an increasingly digital world, they are responsible for things that never used to their remit. IP phones, lights, doors and dare I even mention BYOD and personal smart devices?! And the rate of change, the rate of this digitisation of business and indeed the world, is increasing.3

The Risk of Being Left BehindHow to Protect Your Assets from Cyber Attacks

Most of these demises can be directly attributed to a failure to invest in digitisation of services, products, infrastructure, essentially, their assets.They failed to mitigate the risks of not evolving with the times.

Digital Transformation on a Massive ScaleHow to Protect Your Assets from Cyber Attacks

Most of these demises can be directly attributed to a failure to invest in digitisation of services, products, infrastructure, essentially, their assets.They failed to mitigate the risks of not evolving with the times.

Which one are you?How to Protect Your Assets from Cyber Attacks

As John Chambers, Chairman and former CEO of Cisco quite rightly says there are two types of organisations in the world, ones that have been hacked, and ones that dont yet know theyve been hacked!Which one are you? Dont worry, Im not going to ask for a show of hands!So thats why weve put this event on increasingly, we work to mitigate cyber-security risks in this ever-connected world. And why now? Because cyber-security, or lack of it, is causing avoidable damage. Particularly in our beloved home region of the North East.Many hard working businesses have and will continue to fall victim. And after today, hopefully you wont be one of them.

Newcastle Tops the Wrong LeagueHow to Protect Your Assets from Cyber Attacks

You may have seen in the news recently that Newcastle and surrounding areas top the national table for cyber-security problems. If I only our football teams could do as well in their respective leagues.According to Censuswide, 93% of businesses with over 200 employees have suffered a data breach in the last year or so.Barely a week seems to go by without a major data breach being reported in the news. Including recently, the North Easts only FTSE 100 company.And these are only the ones we hear about! What about the ones that no-one knows have actually taken place? Now thats a scary thought, isnt it?.

What does a Hacker Look Like?How to Protect Your Assets from Cyber Attacks

You may have seen in the news recently that Newcastle and surrounding areas top the national table for cyber-security problems. If I only our football teams could do as well in their respective leagues.According to Censuswide, 93% of businesses with over 200 employees have suffered a data breach in the last year or so.Barely a week seems to go by without a major data breach being reported in the news. Including recently, the North Easts only FTSE 100 company.And these are only the ones we hear about! What about the ones that no-one knows have actually taken place? Now thats a scary thought, isnt it?.

Cyber Security Faux Pas - TalkTalk How to Protect Your Assets from Cyber Attacks

You may have seen in the news recently that Newcastle and surrounding areas top the national table for cyber-security problems. If I only our football teams could do as well in their respective leagues.According to Censuswide, 93% of businesses with over 200 employees have suffered a data breach in the last year or so.Barely a week seems to go by without a major data breach being reported in the news. Including recently, the North Easts only FTSE 100 company.And these are only the ones we hear about! What about the ones that no-one knows have actually taken place? Now thats a scary thought, isnt it?.

Cyber Security is a Board Level IssueHow to Protect Your Assets from Cyber Attacks

Over the last year its brand index, which includes consumer perceptions of reputation, value, quality, buzz and whether theyd recommend a brand to friends, has fallen 1.7 points to a poor score of -9.6. Its reputation score, meanwhile, has dropped by 0.7 points to a score of -9.9.In fact, it is currently bottom on a list of 28 of the UKs biggest tablet and broadband providers for both index and reputation.

TalkTalk Share Price Plummet How to Protect Your Assets from Cyber Attacks

Source: SC Magazine UK

The companys share price fell by a third, it took a near-80 million hit in costs and lost revenue, and 100,000 customers quit. Perhaps it should not be a surprise then that TalkTalk saw its share of new customers in the home services market fall 4.4 percent in the last three months

TalkTalk Share Price Plummet How to Protect Your Assets from Cyber AttacksSource: Google Finance

The companys share price fell by a third, it took a near-80 million hit in costs and lost revenue, and 100,000 customers quit. Perhaps it should not be a surprise then that TalkTalk saw its share of new customers in the home services market fall 4.4 percent in the last three months

TalkTalk BrandIndex DipHow to Protect Your Assets from Cyber Attacks

Source: YouGov

Over the last year its brand index, which includes consumer perceptions of reputation, value, quality, buzz and whether theyd recommend a brand to friends, has fallen 1.7 points to a poor score of -9.6. Its reputation score, meanwhile, has dropped by 0.7 points to a score of -9.9.In fact, it is currently bottom on a list of 28 of the UKs biggest tablet and broadband providers for both index and reputation.

How to Protect Your Assets from Cyber AttacksSource: FireEye Research75% are likely to stop purchasing from a company if a data breach was found to be linked to the board failing to prioritise cyber security.Consumer Attitudes to Cyber Security

Over the last year its brand index, which includes consumer perceptions of reputation, value, quality, buzz and whether theyd recommend a brand to friends, has fallen 1.7 points to a poor score of -9.6. Its reputation score, meanwhile, has dropped by 0.7 points to a score of -9.9.In fact, it is currently bottom on a list of 28 of the UKs biggest tablet and broadband providers for both index and reputation.

How to Protect Your Assets from Cyber AttacksSource: FireEye Research52% would consider paying more for the same products or services from a provider with better data security.Consumer Attitudes to Cyber Security

Over the last year its brand index, which includes consumer perceptions of reputation, value, quality, buzz and whether theyd recommend a brand to friends, has fallen 1.7 points to a poor score of -9.6. Its reputation score, meanwhile, has dropped by 0.7 points to a score of -9.9.In fact, it is currently bottom on a list of 28 of the UKs biggest tablet and broadband providers for both index and reputation.

How to Protect Your Assets from Cyber AttacksSource: FireEye Research59% would take legal action against companies if a data breach resulted in their personal details being used for criminal purposes. Consumer Attitudes to Cyber Security

Over the last year its brand index, which includes consumer perceptions of reputation, value, quality, buzz and whether theyd recommend a brand to friends, has fallen 1.7 points to a poor score of -9.6. Its reputation score, meanwhile, has dropped by 0.7 points to a score of -9.9.In fact, it is currently bottom on a list of 28 of the UKs biggest tablet and broadband providers for both index and reputation.

How to Protect Your Assets from Cyber AttacksSource: FireEye Research90% expect to be informed within 24 hours if their supplier had suffered a data breach which could have compromised their data.Consumer Attitudes to Cyber Security

Over the last year its brand index, which includes consumer perceptions of reputation, value, quality, buzz and whether theyd recommend a brand to friends, has fallen 1.7 points to a poor score of -9.6. Its reputation score, meanwhile, has dropped by 0.7 points to a score of -9.9.In fact, it is currently bottom on a list of 28 of the UKs biggest tablet and broadband providers for both index and reputation.

2000199019952005201020152020

Viruses19902000Worms20002005Spyware and Rootkits2005TodayAPTs CyberwareToday +

Hacking Becomesan Industry

Sophisticated Attacks, Complex Landscape

Phishing, Low Sophistication

The Industrialisation of HackingHow to Protect Your Assets from Cyber Attacks

THE CYBER SECURITY INDUSTRY IS FACING A MAJOR TRANSFORMATION!

HACKERS ARE INDUSTRIALIZING, AND THEY ARE LAUNCHING VERY SOPHISTICATED ATTACKS AGAINST EVERYONE.

THESE HACKERS ARE ORGANIZED, WELL FUNDED AND VERY MOTIVATED.THEY ARE TYPICALLY NATION-STATES OR ORGANIZED CRIMINALS.

BACK IN THE 90S ATTACKS WERE VERY SIMPLE LIKE THE LOVE VIRUS..AS WE SEE THROUGH THIS TIMELINE, THE ATTACKERS SAW THE OPPORTUNITY, AND HAVE BEEN INCREASING THE SOPHISTICATION OF THEIR EXPLOITS.

TODAY, WE ARE FACING A CYBERSECURITY ARMS RACE, AND THE DEFENDERS, OUR CUSTOMERS, ARE STRUGGLING TO KEEP UP WITH THE ATTACKERS..._______________________________________

Designed to evade and reconstituteExploit ServerUserProxy ServerStatus ServerMaster ServerRequests pageReferred toProxy serverProxy server gets data from Exploit serverExploit server sends HTTPrequests to status serverRollup of logdata pushed to master serverStatus server tracksHTTP requests/status

Professional Attack Infrastructure - RansomwareHow to Protect Your Assets from Cyber Attacks

Check vuln 1Check vuln 2Vuln 3 success!Patched?

UserExploit Server

Exploit KitsHow to Protect Your Assets from Cyber Attacks

Industrialisation of threat

How Data Breaches HappenHow to Protect Your Assets from Cyber Attacks

Cyber Crime in the UKHow to Protect Your Assets from Cyber Attacks

National Cyber Security StrategyHow to Protect Your Assets from Cyber Attacks

Stay on the Right TrackHow to Protect Your Assets from Cyber Attacks

With Cisco ASA, all the different layers of security you see at the bottom of this slide work together. Unlike traditional solutions, we layer security intelligence, for greater visibility and to protect against threats coming from multiple vectors across the attack continuum.

With this unique approach, all the solution parts know about each other. For example, the firewall knows about the IPS and its policies. The IPS sees data coming through the firewall, and the malware engine correlates its events with the IPS events. This integration even extends to correlating Indications of Compromise across endpoints and networks. No other solution provides this comprehensive capability. (Most competitors are still just trying to build out their portfolios to have solutions across the attack continuum!)

Classify DataHow to Protect Your Assets from Cyber Attacks

With Cisco ASA, all the different layers of security you see at the bottom of this slide work together. Unlike traditional solutions, we layer security intelligence, for greater visibility and to protect against threats coming from multiple vectors across the attack continuum.

With this unique approach, all the solution parts know about each other. For example, the firewall knows about the IPS and its policies. The IPS sees data coming through the firewall, and the malware engine correlates its events with the IPS events. This integration even extends to correlating Indications of Compromise across endpoints and networks. No other solution provides this comprehensive capability. (Most competitors are still just trying to build out their portfolios to have solutions across the attack continuum!)

Health Check Your Supply ChainHow to Protect Your Assets from Cyber Attacks

With Cisco ASA, all the different layers of security you see at the bottom of this slide work together. Unlike traditional solutions, we layer security intelligence, for greater visibility and to protect against threats coming from multiple vectors across the attack continuum.

With this unique approach, all the solution parts know about each other. For example, the firewall knows about the IPS and its policies. The IPS sees data coming through the firewall, and the malware engine correlates its events with the IPS events. This integration even extends to correlating Indications of Compromise across endpoints and networks. No other solution provides this comprehensive capability. (Most competitors are still just trying to build out their portfolios to have solutions across the attack continuum!)

Draft and Regularly Update an Incident Response Plan (IRP)How to Protect Your Assets from Cyber Attacks

Get Visibility!How to Protect Your Assets from Cyber Attacks

With Cisco ASA, all the different layers of security you see at the bottom of this slide work together. Unlike traditional solutions, we layer security intelligence, for greater visibility and to protect against threats coming from multiple vectors across the attack continuum.

With this unique approach, all the solution parts know about each other. For example, the firewall knows about the IPS and its policies. The IPS sees data coming through the firewall, and the malware engine correlates its events with the IPS events. This integration even extends to correlating Indications of Compromise across endpoints and networks. No other solution provides this comprehensive capability. (Most competitors are still just trying to build out their portfolios to have solutions across the attack continuum!)

Typical VisibilityCisco Services

Basicvisibility

ThreatsUsersWeb ApplicationsApplication ProtocolsFile TransfersMalwareCommand and Control ServersClient ApplicationsNetwork ServersOperating SystemsRouters and SwitchesMobile DevicesPrintersVoIP PhonesVirtual Machines

Superior Network VisibilityHow to Protect Your Assets from Cyber Attacks

Legacy NGFWs dont provide enough visibility to allow enterprises to operationalize their threat defense.

With Cisco ASA and FireSIGHT, we can see far more information than competitive solutions, including threats, users, applications, file transfers, and much more. In particular, FireSIGHT uniquely sees client-side applications and operating systems, mobile device types and their browsers and OSs, and virtual machine communications.

Proof of Value Risk Reports Free of Charge

Free Threat Scan Risk ReportHow to Protect Your Assets from Cyber Attacks

Network ReportAttack ReportAdvance Malware Report

Contextual Visibility of your NetworkHow to Protect Your Assets from Cyber Attacks

Opportunity to DifferentiateHow to Protect Your Assets from Cyber Attacks

Thank YouGet a Free Threat Scan Reportwww.forfusion.com/security