SlideShare a Scribd company logo
1 of 36
Download to read offline
Security First: What It Means for Your Business 1Security First: What It Means for Your Business 1
What It Is and What It Means
for Your Business
Security First
Security First: What It Means for Your Business 2Security First: What It Means for Your Business 2
Security first
is a mindset.
It’s thinking about your company’s
security holistically from the ground up.
Security First: What It Means for Your Business 3Security First: What It Means for Your Business 3
That means looking beyond technical
considerations to see where security
fits into your:
Business model
Software development
People and hiring practices
Pricing
Approach to partnerships
Marketing
Research and innovation
✔
✔
✔
✔
✔
✔
✔
Security First: What It Means for Your Business 4
To do it right, security has to come
first in everything you do. It can’t
ever be an after thought.
Security First: What It Means for Your Business 5Security First: What It Means for Your Business 5
Putting security first not only
keeps your business safe,
it also helps you disrupt
your industry.
Security First: What It Means for Your Business 6
Just think of how innovative
companies are differentiating
themselves by focusing on
security and privacy.
Security First: What It Means for Your Business 7
Apple stands out
as a great example.
Security First: What It Means for Your Business 8Security First: What It Means for Your Business 8
They’ve taken a very public
and forward-thinking stance
on security and privacy.
Security First: What It Means for Your Business 9
“People would like you to
believe you have to give
up privacy to have AI
do something for you,
but we don’t buy that.
It might take more work,
it might take more thinking,
but I don’t think we should
throw our privacy away.”
– Tim Cook
Security First: What It Means for Your Business 10
Apple uses hardware protection
of encryption keys, end-to-end
encryption on iMessage and
differential privacy.
And it’s
more than
words…
Security First: What It Means for Your Business 11
And the strategy
is working!
Zero-day exploits for iOS
are now going for
big bucks.
Security First: What It Means for Your Business 12
“…I applaud Apple for trying to improve
privacy within its business models…”
– Bruce Schneier, internationally renowned security technologist
“The majority of enterprises still feel it
is easier for them to secure their
enterprise data on the iOS platform.”
– Dionisio Zumerle, Gartner
The reactions Apple
has been getting are
very favorable.
Security First: What It Means for Your Business 13
While Apple is a great
example of a company
that’s getting security
first right, most
companies don’t.
Security First: What It Means for Your Business 14
After Jeep Hack, Chrysler Recalls
1.4 Million Vehicles for Bug Fix
Target CEO Fired: Can You Be
Fired If Your Company Is Hacked?
Ransomware attacks to quadruple
in 2016, study finds
And that’s having
a major impact
in lots of ways.
Security First: What It Means for Your Business 15
Not only that, by 2020, the global
cost of cyber crimes is expected
to reach $2.5 trillion.
Security First: What It Means for Your Business 16Security First: What It Means for Your Business 16
To help put things
in perspective,
let’s take a quick look
at the history of
security threats.
Security First: What It Means for Your Business 17Security First: What It Means for Your Business 17
Little valuable data was online
Viruses weren’t a real threat
Crypto was for academics and geeks
1980s &
1990s
Back in the 1980s and 1990s,
there really wasn’t much going on.
2008 – 2016 Present Day2000s
✔
✔
✔
1980s & 1990s
Security First: What It Means for Your Business 18Security First: What It Means for Your Business 18
We had entered the age of
weaponized malware platforms.
Stuxnet attacks Iranian enrichment
Modular, updatable and extensible
malware
Botnets as a service
2000s
✔
✔
✔
2008 – 2016 Present Day2000s1980s & 1990s
By the 2000s, things had changed.
Security First: What It Means for Your Business 19Security First: What It Means for Your Business 19
2008 –
2016Anthem: Hacked Database
Included 78.8 Million People
2008 – 2016 Present Day2000s1980s & 1990s
And since 2008, we’ve seen an
onslaught of security mega breaches...
Security First: What It Means for Your Business 20Security First: What It Means for Your Business 20
Digitization of everything
Post-Snowden privacy mindset
End-to-end encryption in WhatsApp
Rise of blockchain and Bitcoin
2008 – 2016 Present Day2000s1980s & 1990s
✔
✔
✔
✔
Along with a variety of other
important changes.
2008 –
2016
Security First: What It Means for Your Business 21Security First: What It Means for Your Business 21
2008 – 2016 Present Day2000s1980s & 1990s
Differential privacy in mainstream
products
Blockchains everywhere
Passwordless authentication
Ransomware
IoT DDoS attacks
Present
Day
✔
✔
✔
✔
✔
Fast forward to present day,
and the changes keep coming.
Security First: What It Means for Your Business 22
Looking ahead at the
intersection of
security and artificial
intelligence (AI),
there will be challenges
and opportunities.
Security First: What It Means for Your Business 23Security First: What It Means for Your Business 23
The challenges will be
in terms of AI safety and
security, with hackers
potentially able to…
Security First: What It Means for Your Business 24
Convince a self-driving
car to swerve into
oncoming traffic.
Security First: What It Means for Your Business 25
Trick a bot into thinking
that someone else
requested a transaction.
Security First: What It Means for Your Business 26
Or make an industrial
system think that it’s
not overheating.
Security First: What It Means for Your Business 27Security First: What It Means for Your Business 27
There will also be opportunities
to utilize AI to increase cyber
security to...
Security First: What It Means for Your Business 28
Monitor and
detect events at
“beyond human”
scale.
Remove
human error from
writing and
patching code.
Human-like
pattern matching
for access
authorization.
Security First: What It Means for Your Business 29Security First: What It Means for Your Business 29
Automated detection, evaluation and patching.
The future is
arriving now:
Security First: What It Means for Your Business 30Security First: What It Means for Your Business 30
So what can you do to
help your company adopt
a security first mindset?
Security First: What It Means for Your Business 31
Here are three ideas
to start with:
Security First: What It Means for Your Business 32Security First: What It Means for Your Business 32
Make security decisions
early and often.1
Security First: What It Means for Your Business 33Security First: What It Means for Your Business 33
Build security into every
facet of your business.2
Security First: What It Means for Your Business 34Security First: What It Means for Your Business 34
Compliance is table
stakes. Go well beyond
security basics.
3
Security First: What It Means for Your Business 35
Last but not least, keep in mind that (good)
security is complex and that attackers are
adaptive and don’t play by the rules.
Security First: What It Means for Your Business 36Security First: What It Means for Your Business 36
Want to learn more
about security first?
Click here to listen to the podcast

More Related Content

What's hot

Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital spaceYves Sinka
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader ProblemPrivacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader ProblemMatthew Karnas
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slidesExponential_e
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignDr. Ann Cavoukian
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP Paribas(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP ParibasEnjoyDigitAll by BNP Paribas
 
Cloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLACloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLARaj Goel
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarConcept Searching, Inc
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)Ulf Mattsson
 
Understanding Blockchains
Understanding BlockchainsUnderstanding Blockchains
Understanding BlockchainsBlockStars.io
 

What's hot (20)

Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital space
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader ProblemPrivacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slides
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP Paribas(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP Paribas
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 
Cloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLACloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLA
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
 
Understanding Blockchains
Understanding BlockchainsUnderstanding Blockchains
Understanding Blockchains
 

Viewers also liked

11 Principles of Applied Analytics
11 Principles of Applied Analytics11 Principles of Applied Analytics
11 Principles of Applied AnalyticsGeorgian
 
Conversational Business - Trends
Conversational Business - TrendsConversational Business - Trends
Conversational Business - TrendsGeorgian
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security Bill Gibbs
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Cyber Security for Business Traveller
Cyber Security for Business TravellerCyber Security for Business Traveller
Cyber Security for Business TravellerRajneesh G
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleAndris Soroka
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Adam Ziaja
 
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...Sucuri
 
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?PwC Polska
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsCYBERWISER .eu
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011Arjun V
 
Machine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicMachine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicAmirali Charania
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your BusinessNeil Kemp
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNeha Gupta
 

Viewers also liked (20)

11 Principles of Applied Analytics
11 Principles of Applied Analytics11 Principles of Applied Analytics
11 Principles of Applied Analytics
 
Conversational Business - Trends
Conversational Business - TrendsConversational Business - Trends
Conversational Business - Trends
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Cyber Security for Business Traveller
Cyber Security for Business TravellerCyber Security for Business Traveller
Cyber Security for Business Traveller
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Information Security and your Business
Information Security and your BusinessInformation Security and your Business
Information Security and your Business
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)
 
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
 
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
 
Machine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicMachine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magic
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your Business
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Security First: What it is and What it Means for Your Business

How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfonline Marketing
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfonline Marketing
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaStefan Streichsbier
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMRick Bouter
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
top 10 ethical hacking imaportance.pptx
top 10 ethical hacking imaportance.pptxtop 10 ethical hacking imaportance.pptx
top 10 ethical hacking imaportance.pptxNarangYadav
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016James_08
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Berezha Security Group
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 

Similar to Security First: What it is and What it Means for Your Business (20)

Pitss
PitssPitss
Pitss
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
top 10 ethical hacking imaportance.pptx
top 10 ethical hacking imaportance.pptxtop 10 ethical hacking imaportance.pptx
top 10 ethical hacking imaportance.pptx
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 

Recently uploaded

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Security First: What it is and What it Means for Your Business

  • 1. Security First: What It Means for Your Business 1Security First: What It Means for Your Business 1 What It Is and What It Means for Your Business Security First
  • 2. Security First: What It Means for Your Business 2Security First: What It Means for Your Business 2 Security first is a mindset. It’s thinking about your company’s security holistically from the ground up.
  • 3. Security First: What It Means for Your Business 3Security First: What It Means for Your Business 3 That means looking beyond technical considerations to see where security fits into your: Business model Software development People and hiring practices Pricing Approach to partnerships Marketing Research and innovation ✔ ✔ ✔ ✔ ✔ ✔ ✔
  • 4. Security First: What It Means for Your Business 4 To do it right, security has to come first in everything you do. It can’t ever be an after thought.
  • 5. Security First: What It Means for Your Business 5Security First: What It Means for Your Business 5 Putting security first not only keeps your business safe, it also helps you disrupt your industry.
  • 6. Security First: What It Means for Your Business 6 Just think of how innovative companies are differentiating themselves by focusing on security and privacy.
  • 7. Security First: What It Means for Your Business 7 Apple stands out as a great example.
  • 8. Security First: What It Means for Your Business 8Security First: What It Means for Your Business 8 They’ve taken a very public and forward-thinking stance on security and privacy.
  • 9. Security First: What It Means for Your Business 9 “People would like you to believe you have to give up privacy to have AI do something for you, but we don’t buy that. It might take more work, it might take more thinking, but I don’t think we should throw our privacy away.” – Tim Cook
  • 10. Security First: What It Means for Your Business 10 Apple uses hardware protection of encryption keys, end-to-end encryption on iMessage and differential privacy. And it’s more than words…
  • 11. Security First: What It Means for Your Business 11 And the strategy is working! Zero-day exploits for iOS are now going for big bucks.
  • 12. Security First: What It Means for Your Business 12 “…I applaud Apple for trying to improve privacy within its business models…” – Bruce Schneier, internationally renowned security technologist “The majority of enterprises still feel it is easier for them to secure their enterprise data on the iOS platform.” – Dionisio Zumerle, Gartner The reactions Apple has been getting are very favorable.
  • 13. Security First: What It Means for Your Business 13 While Apple is a great example of a company that’s getting security first right, most companies don’t.
  • 14. Security First: What It Means for Your Business 14 After Jeep Hack, Chrysler Recalls 1.4 Million Vehicles for Bug Fix Target CEO Fired: Can You Be Fired If Your Company Is Hacked? Ransomware attacks to quadruple in 2016, study finds And that’s having a major impact in lots of ways.
  • 15. Security First: What It Means for Your Business 15 Not only that, by 2020, the global cost of cyber crimes is expected to reach $2.5 trillion.
  • 16. Security First: What It Means for Your Business 16Security First: What It Means for Your Business 16 To help put things in perspective, let’s take a quick look at the history of security threats.
  • 17. Security First: What It Means for Your Business 17Security First: What It Means for Your Business 17 Little valuable data was online Viruses weren’t a real threat Crypto was for academics and geeks 1980s & 1990s Back in the 1980s and 1990s, there really wasn’t much going on. 2008 – 2016 Present Day2000s ✔ ✔ ✔ 1980s & 1990s
  • 18. Security First: What It Means for Your Business 18Security First: What It Means for Your Business 18 We had entered the age of weaponized malware platforms. Stuxnet attacks Iranian enrichment Modular, updatable and extensible malware Botnets as a service 2000s ✔ ✔ ✔ 2008 – 2016 Present Day2000s1980s & 1990s By the 2000s, things had changed.
  • 19. Security First: What It Means for Your Business 19Security First: What It Means for Your Business 19 2008 – 2016Anthem: Hacked Database Included 78.8 Million People 2008 – 2016 Present Day2000s1980s & 1990s And since 2008, we’ve seen an onslaught of security mega breaches...
  • 20. Security First: What It Means for Your Business 20Security First: What It Means for Your Business 20 Digitization of everything Post-Snowden privacy mindset End-to-end encryption in WhatsApp Rise of blockchain and Bitcoin 2008 – 2016 Present Day2000s1980s & 1990s ✔ ✔ ✔ ✔ Along with a variety of other important changes. 2008 – 2016
  • 21. Security First: What It Means for Your Business 21Security First: What It Means for Your Business 21 2008 – 2016 Present Day2000s1980s & 1990s Differential privacy in mainstream products Blockchains everywhere Passwordless authentication Ransomware IoT DDoS attacks Present Day ✔ ✔ ✔ ✔ ✔ Fast forward to present day, and the changes keep coming.
  • 22. Security First: What It Means for Your Business 22 Looking ahead at the intersection of security and artificial intelligence (AI), there will be challenges and opportunities.
  • 23. Security First: What It Means for Your Business 23Security First: What It Means for Your Business 23 The challenges will be in terms of AI safety and security, with hackers potentially able to…
  • 24. Security First: What It Means for Your Business 24 Convince a self-driving car to swerve into oncoming traffic.
  • 25. Security First: What It Means for Your Business 25 Trick a bot into thinking that someone else requested a transaction.
  • 26. Security First: What It Means for Your Business 26 Or make an industrial system think that it’s not overheating.
  • 27. Security First: What It Means for Your Business 27Security First: What It Means for Your Business 27 There will also be opportunities to utilize AI to increase cyber security to...
  • 28. Security First: What It Means for Your Business 28 Monitor and detect events at “beyond human” scale. Remove human error from writing and patching code. Human-like pattern matching for access authorization.
  • 29. Security First: What It Means for Your Business 29Security First: What It Means for Your Business 29 Automated detection, evaluation and patching. The future is arriving now:
  • 30. Security First: What It Means for Your Business 30Security First: What It Means for Your Business 30 So what can you do to help your company adopt a security first mindset?
  • 31. Security First: What It Means for Your Business 31 Here are three ideas to start with:
  • 32. Security First: What It Means for Your Business 32Security First: What It Means for Your Business 32 Make security decisions early and often.1
  • 33. Security First: What It Means for Your Business 33Security First: What It Means for Your Business 33 Build security into every facet of your business.2
  • 34. Security First: What It Means for Your Business 34Security First: What It Means for Your Business 34 Compliance is table stakes. Go well beyond security basics. 3
  • 35. Security First: What It Means for Your Business 35 Last but not least, keep in mind that (good) security is complex and that attackers are adaptive and don’t play by the rules.
  • 36. Security First: What It Means for Your Business 36Security First: What It Means for Your Business 36 Want to learn more about security first? Click here to listen to the podcast