Scot Secure 2015
-
Upload
ray-bugg -
Category
Technology
-
view
137 -
download
3
Transcript of Scot Secure 2015
![Page 1: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/1.jpg)
Welcome To
![Page 2: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/2.jpg)
Mark StephenBBC Scotland #scotsecure
![Page 3: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/3.jpg)
Steve MulhearnFortinet
#scotsecure
![Page 4: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/4.jpg)
© Copyright Fortinet Inc. All rights reserved.
Security Challenges and Emerging Threats
Steve Mulhearn- Business Solutions DevelopmentApril 2015
![Page 5: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/5.jpg)
5
Challenges Today
COST
» Operational
» Capital
CONSOLIDATION
» Virtual
» Manpower
SECURITY
» Emerging Threat
» Advanced Threats
![Page 6: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/6.jpg)
6
What We Used To Think
![Page 7: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/7.jpg)
7
How We Think Today
![Page 8: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/8.jpg)
8
The Anatomy Of An Attack
“Generic Threat”
Bot
Zero Day Threat
Trojan
Virus
Worm
Devices
Web sites
Physical media
![Page 9: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/9.jpg)
9
Advanced Targeted Attack Lifecycle
Day 1 2 Years +
“Social
Engineering”
“Bot net”
Activation
Zero Day
Exploit
![Page 10: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/10.jpg)
10
The Threat is Worse Than Ever
*Akylus July 2014
![Page 11: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/11.jpg)
11
With A Consistent Motivation
*Hackmageddon July 2014
![Page 12: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/12.jpg)
12
Q2 2014 (IDC):
301.3M Smart Phones Shipped
Android 84.7% Market
February:
Drive-By Mobile
(DriveGenie)
June:
Pletor Mobile Ransom
(Doc Encryption)
July:
Dorkbot/Ngrbot
Kamikaze
2014 Threat Landscape Developments
Feb 13
IoT:
The Moon Worm
Linksys Routers
Heartbleed
Vulnerable OpenSSL
Apr 07
Apple iCloud
Ransomware
$100 EUR
Oleg Pliss
May 26 Jun 23
Havex RAT
OPC Server Spy
Aug 05
Cybervor
1.2B User & Pass
500M emails
Aug 15
Supervalu Data Breach,
200 Stores Affected
Evernote Hack
164,644 Forum
Members
Jun 10Evernote Hack
50M Users
Mar
2013
![Page 13: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/13.jpg)
13
No One Is Immune
Have you changed your password yet?
![Page 14: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/14.jpg)
14
ebay – The Impact by the Numbers
262,800Number of Passwords changed in a year
(Average 2 minutes/password)
551 Man/years wasted changing passwords
145 M User accounts compromised
525,600 Minutes in a year
![Page 15: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/15.jpg)
15
Follow The Acronym Trail
![Page 16: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/16.jpg)
16
Is There A Silver Bullet For Defeating an ATA?
![Page 17: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/17.jpg)
17
Collaborative Approach to Addressing Advanced Threats
http://www.networkworld.com/news/2013/103013-gartner-defense-attacks-275438.html?page=2
![Page 18: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/18.jpg)
18
Focus on Three Key Actions
Step 1 - Mitigation
• Mitigate threats before they enter
your network
• Proactive is key
Step 2 - Detection
• Discover threats that have
or tried to enter the network
Step 3 - Remediation
• Respond to any threats that
have breached the network
![Page 19: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/19.jpg)
19
Mitigation
DetectionRemediation
A Structured Approach for Maximum Protection
Access Control• Reduce Attack
Surface
Threat Prevention• Inspect and block
threats
Threat Detection• Identify new
incidents
Continuous
Monitoring• Assess, audit,
improveIncident Response• Validate and contain
![Page 20: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/20.jpg)
20
Step 1 - Mitigation
Access Control
» Stateful Firewall
» 2 Factor Authentication
Threat Prevention
» Intrusion Prevention
» Application Control
» Web Filtering
» Email Filtering
» Anti-Virus
![Page 21: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/21.jpg)
21
A Cornerstone of Mitigation
The reports of my death
have been greatly
exaggerated.
![Page 22: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/22.jpg)
22
The Human Factor - Laziness
“Old Habits Die Hard”
![Page 23: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/23.jpg)
23
Operating Systems and Software Require Constant Updates
12%
52%
24%
3%9%
Installed PC Operating Systems*
Windows 8/8.1
Windows 7
Windows XP
Windows Vista
Other
*Net Applications September 2014
![Page 24: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/24.jpg)
24
Not All Anti-Virus Solutions are Equal
Detection
Technology
Network
Placement
Operational
Efficacy
![Page 25: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/25.jpg)
25
Step 2 - Detection
Access Control
» Stateful Firewall
» 2 Factor Authentication
Threat Prevention
» Intrusion Prevention
» Application Control
» Web Filtering
» Email Filtering
» Deep Flow Anti-malware
Threat Detection
» Botnet detection
» Client reputation
» Network behavior analysis
» Sandboxing
![Page 26: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/26.jpg)
26
Payload Analysis (aka “sandboxing”)
What is it?» Virtual container, reflecting an end user desktop, in which
untrusted programs can be safely examined
What happens in it?» Code is executed in an contained, virtual environment
» Activity is logged and is analyzed for suspect characteristics
» Rating is determined based on system, file, web and traffic activity
Why is it important?» Traditional security looks at static attributes (signature, heuristic,
pattern, reputation, etc.) rather than dynamic activity
» In many cases, a site or code is just the first, small stage
Unsafe action, escape attempt
Controlled communication
inspection
X
![Page 27: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/27.jpg)
27
A Deeper Level of Analysis
Network Behavior Analysis» Establish baselines of normal traffic patterns, look for anomalies
Network Forensics» Capture and replay network traffic for incident response
Payload Analysis» Execute code in a contained, “sandbox” environment
Endpoint Behavior Analysis» Monitor the production system configuration for anomalies
Endpoint Forensics» Collect data from endpoints to aid in incident response and forensics
![Page 28: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/28.jpg)
28
Technology Hype and Hysteria
VISIBILITY
TIME
Technology
Trigger
Peak of Inflated
Expectations
Trough of
Disillusionment
Slope of
Enlightenment
Plateau of Productivity
![Page 29: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/29.jpg)
29
A Word of Caution
http://www.darkreading.com/attacks-breaches/the-increasing-failure-of-malware-sandbo/240159977
![Page 30: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/30.jpg)
30
Step 3 - Remediation
Access Control
» Stateful Firewall
» 2 Factor Authentication
Threat Prevention
» Intrusion Prevention
» Application Control
» Web Filtering
» Email Filtering
» Deep Flow Anti-malware
Threat Detection
» Sandboxing
» Botnet detection
» Client reputation
» Network behavior analysis
• Incident Response
» Consolidated logs and reports
» Professional Services
» User or Device Quarantine
» Threat Prevention Updates
• Continuous Monitoring
» Real-time Activity Views
» Security Reporting
» Threat Intelligence
![Page 31: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/31.jpg)
31
Coordinated Defense Strategy
In-Network
Defenses
Continuous
Updates
Threat Research
and Discovery
![Page 32: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/32.jpg)
32
The Fortinet ATP Solution
FortiGuard Services
FortiGuard Lab
![Page 33: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/33.jpg)
33
Protecting Today’s Network
Evolution, evolution, evolution
Wherever there is value, the cyber criminal will follow
![Page 34: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/34.jpg)
34
Protecting Today’s Network
Evolution, evolution, evolution
Wherever there is value, the cyber criminal will follow
Anticipate, React, Respond
![Page 35: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/35.jpg)
35
Complexity
![Page 36: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/36.jpg)
Tony NeateGet Safe Online
#scotsecure
![Page 37: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/37.jpg)
Det Supt Stevie WilsonPolice Scotland
#scotsecure
![Page 38: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/38.jpg)
Brian GibsonScottish Business Resilience Centre
#scotsecure
![Page 39: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/39.jpg)
Brian GibsonChief Inspector
Deputy Director Scottish Business Resilience Centre
![Page 40: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/40.jpg)
• We are a unique organisation comprising of contributionsand secondments from the Police, Scottish Government,Fire Services, Scottish Clearing Banks, investors and ourmembership.
• Vision• Creating a secure & resilient Scotland for business to flourish in
• Stakeholders• Scottish Government, Police Scotland, Members
![Page 41: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/41.jpg)
Digital Security Support
Online Footprint Assessment
![Page 42: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/42.jpg)
Digital Security Support
Cyber Supply Chain Test
![Page 43: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/43.jpg)
Digital Security Support
Cyber Security Assessment
![Page 44: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/44.jpg)
![Page 45: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/45.jpg)
Insider Threat
• Case Study 1 - Pet Shop
• Case Study 2 – Call Centre
![Page 46: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/46.jpg)
![Page 47: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/47.jpg)
Developing a Cyber Security Strategy
• Mind-set
• E – Trader Accreditation
• Cyber Essentials (CE) Cyber Essentials Plus (CE+)
• Innovation Voucher Scheme
• Get Safe Online (getsafeonline.org)
• Cyber Streetwise – (cyberstreetwise.com)
![Page 48: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/48.jpg)
Thank YouQUESTIONS ?
![Page 49: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/49.jpg)
Questions & Discussion#scotsecure
![Page 50: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/50.jpg)
Exhibition & RefreshmentsCheck badge for Breakouts
#scotsecure
![Page 51: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/51.jpg)
18th June Dynamic Earth
Limited spaces remain
www.scot-cloud.com
![Page 52: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/52.jpg)
30th Sept Dynamic Earth
Registration open
www.iotscotland.com
![Page 53: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/53.jpg)
Welcome Back
![Page 54: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/54.jpg)
Prof. Bill BuchananEdinburgh Napier
University#scotsecure
![Page 55: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/55.jpg)
Glenn AttridgeRoyal Bank of Scotland
#scotsecure
![Page 56: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/56.jpg)
Jiveen LalRisksmith
#scotsecure
![Page 57: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/57.jpg)
Risk, responsibility and contractual obligation
Jiveen Lal, Director
+44(0)77 1402 3912
@risksmithUK
![Page 58: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/58.jpg)
AGENDA
Risk, responsibility and contractual obligation
![Page 59: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/59.jpg)
Agenda
Contract obligations and cyber attacks• Data loss• Cyber attack
Responsibilities beyond contract obligation
Cyber insurance• Identifying needs and testing your insurance• Market update
![Page 60: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/60.jpg)
DATA LOSS / CYBER ATTACK
Contract obligations
![Page 61: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/61.jpg)
1. Data loss
YouYour client
A client's customer
![Page 62: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/62.jpg)
2. Business interruptions
Supplier
You
Customer
![Page 63: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/63.jpg)
YOUR BUSINESS
Responsibility beyond contracts
![Page 64: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/64.jpg)
Responsibility beyond contracts
Intellectual property
Revenue
Bodily injury
Property damage
Shareholder/Due diligence
Regulations
Brand
![Page 65: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/65.jpg)
BUSINESS NEEDS
Cyber insurance
![Page 66: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/66.jpg)
Identifying business needs
People SystemsInternal
processesExternal events
Business model
![Page 67: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/67.jpg)
Quick test
1. Where is data?
2. Who has access?
3. What happens when a vendor suffers?
4. What are the ramifications of internally-sourced breach?
5. What do you plan to do when you have a data breach?
![Page 68: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/68.jpg)
Cyber insurance update
• Experienced an event
• Know someone
• Increased awareness
• Fines/penalties
• Contract obligations
• Technology companies
![Page 69: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/69.jpg)
Jamie GravesZoneFox
#scotsecure
![Page 71: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/71.jpg)
![Page 72: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/72.jpg)
![Page 73: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/73.jpg)
![Page 74: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/74.jpg)
![Page 75: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/75.jpg)
![Page 76: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/76.jpg)
![Page 77: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/77.jpg)
![Page 78: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/78.jpg)
![Page 79: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/79.jpg)
![Page 81: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/81.jpg)
Questions & Discussion#scotsecure
![Page 82: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/82.jpg)
18th June Dynamic Earth
Limited spaces remain
www.scot-cloud.com
![Page 83: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/83.jpg)
30th Sept Dynamic Earth
Registration open
www.iotscotland.com
![Page 84: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/84.jpg)
Post Conference SurveyPlease complete
to get slides#scotsecure
![Page 85: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/85.jpg)
Drinks & NetworkingExhibition Area
#scotsecure
![Page 86: Scot Secure 2015](https://reader030.fdocuments.net/reader030/viewer/2022020208/55a5ef4e1a28abfd6a8b487d/html5/thumbnails/86.jpg)
Conference Close#scotsecure