Download - How to Protect your Assets from Cyber Attacks

Transcript
Page 1: How to Protect your Assets from Cyber Attacks

How to Protect Your Assets From Cyber Attacks

1 8 T H J a n 2 0 1 7

P R E S E N T E D B Y :

Sean Ball, Forfusion

Page 2: How to Protect your Assets from Cyber Attacks

Community HashtagHow to Protect Your Assets from Cyber Attacks

#CyberSecurityNE

Page 3: How to Protect your Assets from Cyber Attacks

IT is a risky business…

It’s all about Risk MitigationHow to Protect Your Assets from Cyber Attacks

Page 4: How to Protect your Assets from Cyber Attacks

The Risk of Being Left BehindHow to Protect Your Assets from Cyber Attacks

Page 5: How to Protect your Assets from Cyber Attacks

Digital Transformation on a Massive ScaleHow to Protect Your Assets from Cyber Attacks

Page 6: How to Protect your Assets from Cyber Attacks

Which one are you?How to Protect Your Assets from Cyber Attacks

Page 7: How to Protect your Assets from Cyber Attacks

Newcastle Tops the Wrong LeagueHow to Protect Your Assets from Cyber Attacks

Page 8: How to Protect your Assets from Cyber Attacks

What does a Hacker Look Like?How to Protect Your Assets from Cyber Attacks

Page 9: How to Protect your Assets from Cyber Attacks

Cyber Security Faux Pas - TalkTalk How to Protect Your Assets from Cyber Attacks

Page 10: How to Protect your Assets from Cyber Attacks

Cyber Security is a Board Level IssueHow to Protect Your Assets from Cyber Attacks

Page 11: How to Protect your Assets from Cyber Attacks

TalkTalk Share Price Plummet How to Protect Your Assets from Cyber Attacks

Source: SC Magazine UK

Page 12: How to Protect your Assets from Cyber Attacks

TalkTalk Share Price Plummet How to Protect Your Assets from Cyber Attacks

Source: Google Finance

Page 13: How to Protect your Assets from Cyber Attacks

TalkTalk BrandIndex DipHow to Protect Your Assets from Cyber Attacks

Source: YouGov

Page 14: How to Protect your Assets from Cyber Attacks

How to Protect Your Assets from Cyber Attacks

Source: FireEye Research

• 75% are likely to stop

purchasing from a company if

a data breach was found to be

linked to the board failing to

prioritise cyber security.

Consumer Attitudes to Cyber Security

Page 15: How to Protect your Assets from Cyber Attacks

How to Protect Your Assets from Cyber Attacks

Source: FireEye Research

• 52% would consider paying

more for the same products

or services from a provider

with better data security.

Consumer Attitudes to Cyber Security

Page 16: How to Protect your Assets from Cyber Attacks

How to Protect Your Assets from Cyber Attacks

Source: FireEye Research

• 59% would take legal action

against companies if a data

breach resulted in their

personal details being used

for criminal purposes.

Consumer Attitudes to Cyber Security

Page 17: How to Protect your Assets from Cyber Attacks

How to Protect Your Assets from Cyber Attacks

Source: FireEye Research

• 90% expect to be informed

within 24 hours if their

supplier had suffered a data

breach which could have

compromised their data.

Consumer Attitudes to Cyber Security

Page 18: How to Protect your Assets from Cyber Attacks

20001990 1995 2005 2010 2015 2020

Viruses1990–2000

Worms2000–2005

Spyware and Rootkits2005–Today

APTs CyberwareToday +

Hacking Becomesan Industry

Sophisticated Attacks, Complex Landscape

Phishing, Low Sophistication

The Industrialisation of HackingHow to Protect Your Assets from Cyber Attacks

Page 19: How to Protect your Assets from Cyber Attacks

Designed to evade and reconstitute

Exploit Server

User Proxy Server Status Server Master Server

Requests page

Referred toProxy server

Proxy server gets data from Exploit server

Exploit server sends HTTPrequests to status server

Rollup of logdata pushed to master serverStatus server tracks

HTTP requests/status

Professional Attack Infrastructure - RansomwareHow to Protect Your Assets from Cyber Attacks

Page 20: How to Protect your Assets from Cyber Attacks

Check vuln 1

Check vuln 2

Vuln 3 success!✖✔✔

Patched?

User Exploit Server✖✔✔

Exploit KitsHow to Protect Your Assets from Cyber Attacks

Page 21: How to Protect your Assets from Cyber Attacks

How Data Breaches HappenHow to Protect Your Assets from Cyber Attacks

Page 22: How to Protect your Assets from Cyber Attacks

Cyber Crime in the UKHow to Protect Your Assets from Cyber Attacks

Page 23: How to Protect your Assets from Cyber Attacks

National Cyber Security StrategyHow to Protect Your Assets from Cyber Attacks

Page 24: How to Protect your Assets from Cyber Attacks

Stay on the Right TrackHow to Protect Your Assets from Cyber Attacks

Page 25: How to Protect your Assets from Cyber Attacks

Classify DataHow to Protect Your Assets from Cyber Attacks

Page 26: How to Protect your Assets from Cyber Attacks

Health Check Your Supply ChainHow to Protect Your Assets from Cyber Attacks

Page 27: How to Protect your Assets from Cyber Attacks

Draft and Regularly Update an Incident Response Plan (IRP)How to Protect Your Assets from Cyber Attacks

Page 28: How to Protect your Assets from Cyber Attacks

Get Visibility!How to Protect Your Assets from Cyber Attacks

Page 29: How to Protect your Assets from Cyber Attacks

Typical Visibility

Cisco® Services

Basicvisibility

Thre

ats

User

s

Web

App

licat

ions

Appl

icatio

n Pr

otoc

olsFi

le Tr

ansf

ers

Mal

ware

Com

man

d an

d Co

ntro

l Ser

vers

Clie

nt A

pplic

atio

nsNe

twor

k Se

rver

sOpe

ratin

g Sy

stem

sRo

uter

s an

d Sw

itche

sM

obile

Dev

ices

Prin

ters

VoIP

Pho

nes

Virtu

al M

achi

nes

Superior Network VisibilityHow to Protect Your Assets from Cyber Attacks

Page 30: How to Protect your Assets from Cyber Attacks

Proof of Value Risk Reports Free of Charge

Free Threat Scan Risk ReportHow to Protect Your Assets from Cyber Attacks

Page 31: How to Protect your Assets from Cyber Attacks

Network Report Attack Report Advance Malware Report

Contextual Visibility of your NetworkHow to Protect Your Assets from Cyber Attacks

Page 32: How to Protect your Assets from Cyber Attacks

Opportunity to DifferentiateHow to Protect Your Assets from Cyber Attacks

Page 33: How to Protect your Assets from Cyber Attacks

Thank YouGet a Free Threat Scan Reportwww.forfusion.com/security