DSS @RIGA COMM2013 - The Value of an IT Security for Business People

626 views

Published on

Presentation from annual IT and Telcom conference "Riga Comm2013", where DSS took part.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
626
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

DSS @RIGA COMM2013 - The Value of an IT Security for Business People

  1. 1. “Data Security Solutions” business card Specialization – IT Security IT Security services (consulting, audit, pen-testing, market analysis, system testing and integration, training and technical support) Solutions and experience portfolio with more than 20 different technologies - global market leaders Trusted services provider for banks, insurance companies, government and private companies (critical infrastructure etc.)
  2. 2. Agenda Where are we now – technology perspective Cyber security reality check The challenge and the solution Questions & Answers
  3. 3. Productivity Security
  4. 4. Costs New optimum? Risks Optimum? Security costs Remaining part of risk DROŠĪBAS PASĀKUMI Security actions Source: Māris Gabaliņš, The Art Of The Systems
  5. 5. CEO CFO/COO Loss of market share and reputation Legal exposure Audit failure Fines and criminal charges Financial loss CIO Loss of data confidentiality, integrity and/or availability CHRO Violation of employee privacy CMO Loss of customer trust Loss of brand reputation Increasingly, companies are appointing CROs and CISOs with a direct line to the Audit Committee Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series
  6. 6. Agenda cont. Where are we now – technology perspective Cyber security reality check The challenge and the solution Questions & Answers
  7. 7. PC era Mobile era
  8. 8. Video consumption on mobile devices in Europe has climbed by 112% in the last 12 months. This is yet another indication of the video-powered mobile web era on our doorstep. (Source: comScore)
  9. 9. Businesses now spend 24% of marketing budgets on paid search. And, 41% of people are unaware they a clicking on PPC links, believing they are organic results. (Source: Econsultancy)
  10. 10. LinkedIn is nearly three times as effective for lead generation as Twitter and Facebook. And two new users join LinkedIn every second. (Source: Topdogsocialmedia.com) (image via australiance.com)
  11. 11. Google.com processes 12.9 billion searches per month. Of that, 1.17 billion searches are by unique users. (Source: ExpandedRamblings.com)
  12. 12. IT in business is becomming more and more important (ERP, CRM, document management systems, digital prototypes, BI, MIS etc.) E-World for business is developing (eHealth, e-Services, e-Government, video conferencing, web-conferencing utt.) Mobility makes borderless enterprises reality Cyber culture develops faster than cyber security for many years already!
  13. 13. Agenda cont. Where are we now – technology perspective Cyber security reality check The challenge and the solution Questions & Answers
  14. 14. Mobile Malware Explodes McAfee 2013 Q1 Threats Report Mobile banking adoption rising Federal Reserve Survey March 2013 End users fall victim to mobile attacks
  15. 15. Current prices on the Russian underground market: Hacking corporate mailbox: $500 Winlocker ransomware: $10-$20 Unintelligent exploit bundle: $25 Intelligent exploit bundle: $10-$3,000 Basic crypter (for inserting rogue code into benign file): $10-$30 SOCKS bot (to get around firewalls): $100 Hiring a DDoS attack: $30-$70 / day, $1,200 / month Botnet: $200 for 2,000 bots DDoS Botnet: $700 ZeuS source code: $200-$250 Windows rootkit (for installing malicious drivers): $292 Hacking Facebook or Twitter account: $130 Hacking Gmail account: $162 Email spam: $10 per one million emails Email scam (using customer database): $50-$500 per one million emails
  16. 16. Motive 1995 – 2005 1st Decade of the Commercial Internet 2005 – 2015 2nd Decade of the Commercial Internet National Security Infrastructure Attack Espionage Political Activism Monetary Gain Revenge Curiosity Competitors, hacktivists Organized crime Insiders Script-kiddies or hackers
  17. 17. Agenda cont. Where are we now – technology perspective Cyber security reality check The challenge and the solution Questions & Answers
  18. 18. For many companies security is like salt, people just sprinkle it on top.
  19. 19. Secure own mobile application development Static code testing Dynamic code testing BYOD (Bring Your Own Device) policy: Mobile Device Management Mobile Application Management Mobile Content Management (DLP) Data control and data separation Private data Corporate data Secure Access & Strong IT Security policy Secure Connection (encrypted) Identity control, Authentification & Authorization management
  20. 20. Policy and real time control Of devices and applications Of people and IT stuff Of data leak protection Of internet usage Of remote access Of employees training Of…. Encryption of.. Mobile phones Voice calls and text messages eMails Computers and devices Data bases …
  21. 21. Continuous vulnerability and assessment with board’s involvment risk Training and continuous awareness raising for IT specialists and non-IT specialists / employees Best price / performance defense technologies to implement and maintain Trusted IT specialists to help to protect your business plans Be ready to invest because there is no other choice!
  22. 22. www.dss.lv andris@dss.lv +371 29162784

×