Your SlideShare is downloading. ×
0
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Cyber Security - You will be challenged
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber Security - You will be challenged

180

Published on

As presented by Freddie Heygate at the Cyber Security event on the 12th of December 2013

As presented by Freddie Heygate at the Cyber Security event on the 12th of December 2013

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
180
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Your security will be challenged What are you going to do about it?
  • 2. A dark cloud as been hanging over Singapore!
  • 3. 80%
  • 4. 80% 80% of Internet users in Singapore have experienced cyber crime, the fourth highest rate in the world
  • 5. US$944 million
  • 6. US$944 millionConsumer cybercrime costs Singapore the equivalent of $944 million
  • 7. Not to mention these jokers…
  • 8. Consumers are careless.
  • 9. Consumers are careless. 41%
  • 10. Consumers are careless. 41%Don’t use complex passwords or change their passwords regularly
  • 11. And it hurts.
  • 12. And it hurts. US$1,158
  • 13. And it hurts. US$1,158 Average cost to Singaporean consumers is US$1,158compared to a global average of $197
  • 14. Businesses are careless too! Five common problems • Poor/sloppy password practices • Lack of (or adherence to) security policies • No regular maintenance / upgrade cycle • Failure to test for vulnerabilities • No effective plan in place for crises
  • 15. But businesses cannot afford to be! Average cost to a business for cybercrime $1,035,769 USD
  • 16. 2 cautionary tales
  • 17. Sony PlayStation
  • 18. Unencrypted data 77m accounts stolen Network down for 24d Costs of $171 million The biggest data breach in history
  • 19. Unencrypted data 77m accounts stolen Network down for 24d Costs of $171 million The biggest data breach in historySorry!
  • 20. October 3rd, 2013 2.9 Million Customers details stolen
  • 21. All of this was PREVENTABLE.
  • 22. And worse still, they both stalled & denied the scale of the problem!
  • 23. But businesses cannot afford to be!
  • 24. • Run a comprehensive security audit • Focus on business critical areas • Establish a sensible security policy • Regular training for all staff • Communicate why it is important • Establish scheduled maintenance • Regular tests for vulnerabilities • Set up internal reporting / KPIs
  • 25. But where humans are concerned there’s no such thing as 100% secure. Plan for that too!
  • 26. Your security will be compromised
  • 27. Your security will be compromised “How you retrieve the situation is what matters”
  • 28. Your security will be compromised Plan for the worst • Scenario Testing • Response Plan • Training & Preparation
  • 29. Remain calm, communicate quickly and effectively.
  • 30. Always try to stay one step ahead of the game
  • 31. Always try to stay one step ahead of the game
  • 32. Thanks

×