SlideShare a Scribd company logo
1 of 138
Download to read offline
SPOTLIGHT ON
TECHNOLOGY
#SOT17
Misdirection
a form of deception in which the attention of an audience is focused
on one thing in order to distract its attention from another.
Wikipedia
Gartner predicts that by 2018, 10 percent of enterprises will use
deception tools and tactics, and actively participate in deception
operations against attackers.
Honeypot / Honeynet – 2005
“Never attempt to win by force what can be won by deception,”
Italian political philosopher Niccolo Machiavelli.
Agenda
12.00- 12.40 Registration, meet the exhibitors, tea/coffee
12.40-12.45 Take your seats
12.45-12.55 Welcome and logistics
12.55-13.10 SmartSTEMs
13.10-13.25 Pure Storage Demonstration
13.25-13.45 GDPR with Laura Irvine, BTO Solicitors LLP
13.45-14.00 ZoneFox Demonstration
14.00-14.30 Afternoon Break tea/coffee and donuts
14.30-14.45 Lenovo Demonstration
14.45-15.05 Anatomy of an Attack: Ransomware
15.05-15.20 Trend Micro Demonstration
15.20-15.50 Top Threats and how to manage them
15.50-16.05 Arcserve Demonstration
16.05-16.35 Customer Panel
16.35-17.00 Q&A / Close
SPOTLIGHT ON
TECHNOLOGY
#SOT17
Title Text
Karen Murray
Personal Assistant, Events Manager
and Volunteer
Title Text
Title Text
Title TextSmartSTEMs is the glue between Tertiary Education, Industry and
Schools. We exist to provide equity of opportunity to young people
into STEM (Science Technology Engineering and Mathematics) with
particular focus on the gender and skills gap.
HUB OUTREACH
Title TextSome Numbers
• Less than 2 out of 10 ICT employees are female Nesta
• Skills gap in Scotland is 7000 people ScotlandIS
• 15% Female apprenticeships IT & Telecomms SDS
• 9% Female apprenticeships ICT SDS
• 10% Female apprenticeships Information Security SDS
Title Text
Title Text
• 500 Girls
• 200 Volunteers
• 83 Workshops
• 45 Companies
• 8 Partners
3rd June 2015
Title Text
Title TextGirls Engaged through SmartSTEMs
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
2015 2016 2017
500
3000
5000
Title Text
SUPPORTERS
Title Text
HOSTS INSTITUTIONS
Title Text
Metrics
Title Text
Title Text Emma Cairns
SmartSTEMs Scholar
“To me, SmartSTEMs means provision for the future: it’s
what is necessary to create a talent pipeline that will keep
on giving for decades to come.”
Title Text
#Collaborationiskey
• Schools
• HE/FE
• Industry
• Individuals
Title Text
• Your CSR initiative
• Apprenticeship / Talent Pipeline
• Succession Planning
• Access to schools
• Access to HE/FE Establishments
• R&D support
• Expanding your network
SmartSTEMs Can Support YOU
Title Text
• PR/Media Awareness generally
• Volunteering
• Using your network
• Sources of other future funding for expansion
Can you support SmartSTEMs?
Title Text
Title TextTHANK YOUTHANK
YOU
SPOTLIGHT ON
TECHNOLOGY
#SOT17
Pure Storage
SPOTLIGHT ON
TECHNOLOGY
#SOT17
What’s Magical about the GDPR?
Laura Irvine, Partner at BTO Solicitors LLP
Puts the Data Subject Back
in Control of their Personal Data
Provides organisations with a headache as they
have more obligations
And Provides the ICO with more powers
The Hermione Grainger of GDPR
Quote: Laura is
the hot
favourite
speaker and
font of all
things GDPR.
Laura actually
likes GDPR. !!!!
GDPR Magic?
Final version published on 4 May 2016 and will be enforced from 25
May 2018.
Direct effect throughout the EU.
Brexit will have no impact initially and will be unlikely to have an impact
in the near future.
Will replace the Data Protection Act 1998.
Data Protection Bill published today.
Other legal changes to watch out for: Police Directive; National
Infrastructures Directive, ePrivacy Regulation.
GDPR Basics for Organisations
Legal Processing – it is not all about consent
Fair and Transparent Processing – it is all about providing the data
subject with information in relation to what you are doing with their
personal data
Data Subject Rights – new and enhanced rights
Data Protection Officer – a requirement for certain organisations
Accountability – responsible for complying with GDPR principles and
demonstrating compliance with GDPR principles
Controllers and Processors – due diligence, contractual terms
GDPR and Security – Sixth Principle
Personal data shall be: processed in a manner that
ensures appropriate security of the personal data,
including protection against unauthorised or unlawful
processing and against accidental loss, destruction or
damage, using appropriate technical or organisational
measures
‘integrity and confidentiality’
Article 32 – Security of Processing
Taking into account the state of the art, the costs of
implementation and the nature, scope, context and
purposes of processing as well as the risk of varying
likelihood and severity for the rights and freedoms of
natural persons, the controller and the processor shall
implement appropriate technical and organisational
measures to ensure a level of security appropriate to
the risk.
Artcile 32 Specifically Encourages ‘as
appropriate’:
 pseudonymisation and encryption of personal data;
 the ability to ensure the ongoing confidentiality, integrity, availability
and resilience of processing systems and services;
 the ability to restore the availability and access to personal data in a
timely manner in the event of a physical or technical incident;
 a process for regularly testing, assessing and evaluating the
effectiveness of technical and organisational measures for ensuring
the security of the processing
Personal Data Breaches, Reporting and Fines
‘personal data breach’ means a breach of security leading to the
accidental or unlawful destruction, loss, alteration, unauthorised
disclosure of, or access to, personal data transmitted, stored or
otherwise processed;
Must be reported unless it is unlikely to result in a risk to the rights and
freedoms of individuals.
Fines of up to € 20 million or 4% global turnover
As Albus Dumbledore says: BTO Can Help
Contact details:
Laura Irvine
T: 0131 222 2940
E: lji@bto.co.uk
www.bto.co.uk/gdpr
SPOTLIGHT ON
TECHNOLOGY
#SOT17
ZoneFox
Analyze. Detect. Protect.
ZoneFox
GDPR and the Insider Threat
How ZoneFox helps
Sam Hampton-Smith
Head of UX
s.hampton-smith@zonefox.com
Who are we?
ZoneFox is an award winning market leader in User Behaviour
Analytics, providing critical insights around data-flow that you need
to secure against the Insider Threat.
Analyze. Detect. Protect.
Let’s start with basics
● What does compliance look like?
● What is an ‘insider threat’?
● What are they threatening and how does this relate to GDPR?
● How can you tell what is important?
● How can you tell who is important?
● But what about the really clever insider?
Analyze. Detect. Protect.
What does compliance look like?
Analyze. Detect. Protect.
What is an ‘insider threat’?
Analyze. Detect. Protect.
What are they threatening and how does this relate to GDPR?
Analyze. Detect. Protect.
How can you tell what is important?
Analyze. Detect. Protect.
How can you tell who is important?
Analyze. Detect. Protect.
Let’s put this all together...
Analyze. Detect. Protect.
But what about the really clever insider?
Analyze. Detect. Protect.
How Does it Work?
Peer Group 3
Peer Group 4
Peer Group 2
Peer Group 1
Statistically relevant outlier a.k.a
Bad Guy
Analyze. Detect. Protect.
What does this look like in production?
Analyze. Detect. Protect.
Key ZoneFox features
+ Lightweight agent based approach
+ Non-intrusive - no enforcement or user
disruption
+ Intuitive & flexible business rules (policies)
+ Flexible web-based user interface
+ In-built alerting & comprehensive reporting
+ Full forensic audit trail
+ On-premise deployment or SaaS
Any Questions?
Break
SPOTLIGHT ON
TECHNOLOGY
#SOT17
Lenovo
SPOTLIGHT ON
TECHNOLOGY
#SOT17
Anatomy of an Attack:
Ransomware
• Protect Corporate Mobile phones
• Protect Employee Personal phones
• Allow connection of phones to PC/Laptop
for charging
Hands Up
• Rooted Android
• USB cable
Demo
• Average $1077
• Phishing is #1 Delivery Mechanism
• “I’ll be back”
• Patch
• Backup
• Defend
• Least Privilege
• Bitcoin wallet 2-3 days to create
Ransomware
SPOTLIGHT ON
TECHNOLOGY
#SOT17
Trend Micro
Trend Micro
Experienced, Innovative, Market Leader
Spotlight on Tech event 14th September 2017
Paul Rickards – Trend Micro Scotland
Trend Micro - The company
What we do How we do it Who we are
EVA CHEN , CEO and Founder
Founded: 1988
Offices: 37
Employees: 6000+
Revenues: $1.2Bn
Cash Assets: $1.65Bn
Headquarters: Tokyo
Recognised leader in endpoint,
server, virtualisation and cloud
security
Protecting the exchange of
digital information for
Businesses and Consumers
Innovative security solutions
1,200 threat experts in 12 TrendLabs
locations around the globe,
1,492 R&D Engineers
$400M USD and 500 Engineers
invested in last 4 years to develop
cloud-related solutions
Global Threat Intelligence with
Smart Protection Network
155million+ endpoints protected500,000+ commercial customers protected
Copyright 2017 Trend Micro Inc.70
LAN Server
Security
1995 2000 2005 201520101990
LAN Server
Security
Leading
Consumer
Anti-Virus
MSN Hotmail
Protection
Gateway
Security
Integrated
Virtualization
Security
Cloud
Computing
Security
Advanced
Threat
Detection
Network
DefenseSmart
Protection
Network
28 Years of Innovation
Copyright 2017 Trend Micro Inc.71
Innovative and Timely Response to
Evolving Threat Landscape
Anti-
malware
Personal Firewall
Anti-
spyware
High-Fidelity
Machine Learning
Sandbox
Analysis
Application
Control
Exploit
Prevention
Census
Check
Data Encryption
Data Loss
Prevention
Behavioral
Analysis
File
Reputation
Web
Reputation
Host-based
IPS
28 years of
innovation
Investigation &
Forensics (EDR)
Variant
Protection
Whitelisting
Check
Copyright 2017 Trend Micro Inc.72
Connected Threat Defense: Better, Faster Protection
Gain centralized visibility
across the system, and
analyze and assess
impact of threats
Enable rapid response
through shared threat
intelligence and delivery
of real-time security
updates
Detect advanced malware,
behavior and
communications invisible
to standard defenses
Assess potential
vulnerabilities and
proactively protect
endpoints, servers and
applications
PROTECT
DETECT
RESPOND
Copyright 2017 Trend Micro Inc.73
Growth in Americas
Americas
29%
EMEA
16%
APAC
55%Americas
22%
EMEA
18%
APAC
60%
FY-2012
93.8B ¥
FY-2016
131.936B ¥
Copyright 2017 Trend Micro Inc.74
FY-2016
Americas
24%
EMEA
20%
APAC
56%
Growth in Commercial Business
Consumer
37%
Commercial
63%
Consumer
29%
Commercial
71%
131.936B ¥
FY-2012
93.8B ¥
Copyright 2017 Trend Micro Inc.75
Cloud and
Virtualization
Consumerization
Complex
Networks
Threats getting through
Broader attack surface
Limited visibility
Stealthier attacks
Many points to protect
High throughputStrong protection with
ability to audit
Performance
Operational efficiency
Copyright 2017 Trend Micro Inc.76
Cloud and
Virtualization
Consumerization
Complex
Networks
Copyright 2017 Trend Micro Inc.77
Copyright 2017 Trend Micro Inc.78
Rik Ferguson – Vice President of Threat Research
Copyright 2017 Trend Micro Inc.79
Application
Control
Behavioral
Analysis
Response &
Containment
Intrusion
Prevention
Machine
Learning
Sandbox
Analysis
Integrity
Monitoring
Anti-Malware & Content
Filtering
SMART
Maximizes protection
NEW!
Copyright 2017 Trend Micro Inc.80
Application
Control
Behavioral
Analysis
Response &
Containment
Intrusion
Prevention
Machine
Learning
Sandbox
Analysis
Integrity
Monitoring
Anti-Malware & Content
Filtering
Application
Control
Behavioral
Analysis
Response &
Containment
Intrusion
Prevention
Machine
Learning
Sandbox
Analysis
Integrity
Monitoring
Anti-Malware & Content
Filtering
Application
Control
Behavioral
Analysis
Response &
Containment
Intrusion
Prevention
Machine
Learning
Sandbox
Analysis
Integrity
Monitoring
Anti-Malware & Content
Filtering
OPTIMIZED
Minimizes IT impact
Copyright 2017 Trend Micro Inc.81
CONNECTED
Speeds time to protect,
detect and respond
Copyright 2017 Trend Micro Inc.82
Best Overall Average Score for 2.5 Years
Includes performance, protection (prevalent & 0-day) & usability
Source: av-test.org
Jan 2014 to June 2016
17.13 17.03 16.77
16.20
15.57
15.90
13.50
11.73
0.00
2.00
4.00
6.00
8.00
10.00
12.00
14.00
16.00
18.00
Trend Micro Kaspersky Symantec F-Secure Sophos Intel-McAfee Cylance Microsoft
Confidential © 2017 Trend Micro Inc.
Gartner Magic Quadrant for
Endpoint Protection Platforms
January 2017
This graphic was published by Gartner, Inc. as part of a larger research document and
should be evaluated in the context of the entire document. The Gartner document is
available upon request from
https://resources.trendmicro.com/Gartner-Magic-Quadrant-Endpoints.html
Gartner does not endorse any vendor, product or service depicted in its research
publications, and does not advise technology users to select only those vendors with the
highest ratings or other designation. Gartner research publications consist of the opinions
of Gartner's research organization and should not be construed as statements of fact.
Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
Copyright 2017 Trend Micro Inc.84
Forrester Wave: Endpoint
Security Suites, Q4 ’16
Copyright 2017 Trend Micro Inc.85
The MARKET LEADER in
server security for the 7th
straight year!
Symantec
Intel
Other
30%
CERTIFIED for key environments
AND for security
EAL 2
Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud
Has Transformed the Datacenter, January 2017 #US41867116
Copyright 2017 Trend Micro Inc.86
Market Leadership Position
The market leader
in server security
for the 7th straight year
Highest and Furthest to the Right in
the Leader’s Quadrant in the Gartner
Magic Quadrant for Endpoint
Protection Platforms, Jan 2017
#1 in protection and performance
• Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud Has
Transformed the Datacenter, January 2017 #US41867116
• NSS Labs Breach Detection Test Results (2014-2016);
NSS NGIPS Test Results, 2016
• http://www.trendmicro.com/us/business/cyber-security/gartner-idps-report/
• https://resources.trendmicro.com/Gartner-Magic-Quadrant-
Endpoints.html
• av-test.org (Jan 2014 to Dec 2016)
Recommended Breach Detection System
for 3 straight years, and
Recommended Next-generation IPS
Leader in Gartner Magic Quadrant for
Intrusion Detection and Prevention
Systems, January 2017
Copyright 2017 Trend Micro Inc.87
Copyright 2017 Trend Micro Inc.88
Thank you!
paul_rickards@trendmicro.co.uk
SPOTLIGHT ON
TECHNOLOGY
#SOT17
THE TOP THREATS
…& HOW TO MANAGE THEM!
Stuart Macdonald - MANAGING DIRECTOR
stuart.macdonald@seric.co.uk @stuart_seric
SEPTEMBER 14TH 2017 – WILD CABARET
#SericCanHelp
• Internal attacks
• Phishing & Spear-phishing
• A dangerous lack of cyber security knowledge
• DDoS attacks
• Malware
• SQL Injection
• BYOD
• Legislative Changes
• IoT Vulnerabilities
• Cross-site script hatching
Top Threats… (The Call)
The Response
Unhappy with this
1. Simple Managed Services
2. Straightforward Solutions
3. Flexible Support
4. Professional Services
Seric’s Response
Managed Services
• Phishing Service
• Internal Vulnerability Scanning
• Web Application Testing
• Web Compliance Testing
• Mobile Application Testing
The Managed Services
Solutions (some examples)
• All Flash Arrays
• End Point Security
• Backup and Restoration
• Insider Threat Detection
• Server and Storage
• SIEM Solutions
• Et al.
Straightforward Solutions
Flexible Support Offerings (some examples)
• Product Specific
• Project Specific
• Wraparound Cover / Enablement
• Holiday Cover
Flexible Support
Professional Services – Audit/Assessment
• GDPR Readiness
• Cyber Essentials / CE+
• CIS20
• Penetration Testing
• ISO27001
• PCI-DSS
• Et.al
Professional Services
Professional Services – Consultancy
• Business Continuity Planning
• Cyber Strategy
• Cloud Strategy
• Compliance Planning
• Cyber Education
Professional Services (cont’d)
• “I need some Essentials thing for a tender I’m doing”
• “I want a Pen Test”
• “I don’t know where to start”
• “I know loosely what I want to do”
• “The board have got no idea”
• “I’ve now got one guy on the board breathing down my neck”
• “We’ve simply not got the resources or funding”
Most Frequent Requests/Comments
• Do things with multiple positive outcomes
• CE+ an easy win
• Educate and manage the business internally
• Map out a strategy
• Incremental Asks
• Speak to the board in a language they understand
• Risk Management
• Framework of measurement
• Evidence your decision making
• Local and or Similar Examples
• Mini-Audit to highlight gaps
• #SericCanHelp
Successful Strategies - One thing begets another
Amen!
twitter.com/stuart_seric youtube.com/user/sericvideo
stuart.macdonald@seric.co.uk #SericCanHelp
SPOTLIGHT ON
TECHNOLOGY
#SOT17
Arcserve
Unified Data Protection
Copyright © 2016 Arcserve (USA), LLC and its affiliates and subsidiaries. All rights reserved.
127
Arcserve Profile
A single, fully-integrated solution portfolio to protect across cloud, virtual and physical environments.
SOFTWARE APPLIANCES CLOUD (DRaaS)
Copyright © 2017 Arcserve. All rights reserved.
Worldwide
Customer Base &
Sales Presence
Industry
Recognition
» 45,000 customers
» 25,000+ UDP customers
» 7,500 partners
» Distributed in 150 countries
» WW HQ – Minneapolis, USA
» LATAM HQ – São Paulo, Brazil
» EMEA HQ – Barcelona
» APAC HQ – Singapore
» Japan HQ – Tokyo
» Sales offices in 20+ countries
» 3 VMworld Gold Awards
» 2 CRN Channel Chief Awards
» Channel Company Top
Midmarket Executive
» MSPBJ Titan of Technology
» 4 Storage Awards
» Cloud Hosting DR Product of the Year
» Computer Singapore Readers’ Choice
Award for Networked Storage
» 2 PC Pro Recommendations
» 3 IT Pro Recommendations
» DCS Storage Software Product
of the Year
» CRN Woman of the Channel
Arcserve UDP Solution Suite
“
“Arcserve delivers an
unprecedented
end-to-end suite of
powerful yet
elegantly simple
availability
solutions for the
midmarket.
Email archive & compliance
Enterprise Power – Small Team Simplicity
Arcserve®
UDP Appliance
The first complete & most
cost-effective data protection
appliance, with Assured
RecoveryTM
▪ Provides all the advanced
features of Arcserve UDP in a
simple, yet powerful appliance
▪ Ideal for customers that require
a “set it and forget it” backup and
recovery solution
▪ Simple, wizard-driven setup for
ease of deployment & usability
▪ Available from 4TB to 80TB of
usable Storage
▪ Built-in SSD drive, for maximum
deduplication performance
▪ Interoperable with existing UDP
software deployments
▪ Arcserve Cloud option provides
a complete, offsite backup & DR
solution
Arcserve UDP 8000 series appliance
Copyright © 2015 Arcserve (USA), LLC and its affiliates and subsidiaries. All rights reserved.
NEW
Each appliance protects as
many Windows or Linux
servers that will fit on it
No extra per-server or per-
socket licenses needed
**Estimated capacity assuming a typical 3:1 deduplication & compression ratio. Actual backup capacity may vary significantly, based upon data
type, backup type, backup schedule etc.
Military Grade Encryption for your Backup Data – GDPR Ready
Key part of the GDPR guidelines is to safeguard Data
to ensure it cannot be lost, stolen or fall into the wrong
hands:
256 Bit AES Encryption can be enabled:
• On the Backup Destinations
• Replicating Backups between Sites
• Replicating to the Cloud
• SSL Encryption and HTTPS Natively built into
Arcserve UDP
• Can protect Encrypted VM’s (VSphere 6.5 ready)
• Can protect Servers and Workstations with
Microsoft Bitlocker enabled
Copyright © 2016 Arcserve. All rights reserved.
Safeguarding and Securing Email - Office 365 Protection
OFFICE 365- USER MAILBOXES
WINDOWS PROXY
RECOVERY POINT
SERVER
ADDITIONAL COPIES
DISC, TAPE,
CLOUD
CENTRALIZED
MANAGEMENT
GRANULAR RESTORE
DIRECTLY FROM PRIMARY OR SECONDARY COPY
LOCAL SITE OR CLOUD ENVIRONMENT
BACKUPS PERFORMED AT LEVEL
OF MAILBOXES / STORES
SIMPLE DATA STORAGE
WITHOUT DEDUPLICATION
Office 365 Protection (Exchange)
» Eliminate the risk of data loss due to an
Office 365 outage or (accidental) user
deletion.
» Protect the Office 365 emails to local
UDP backup or cloud.
» Recover Emails, Calendar, Contacts,
Tasks, Notes
» Can Protect Archive Email and Public
Folders
» Selectively backup only important
folders and exclude others.
» Included with per-TB and Appliance
pricing models
» New subscription purchase for socket
customers
Copyright © 2017 Arcserve. All rights reserved.
Arcserve® UDP
Arcserve UDP Archiving Topology
132
Award Winning!
133
“Arcserve is the closest to feature-complete that
you’re likely to see in the backup space.”
“Arcserve UDP was the only system able to recover data over
a SAN. It also offered the support for a heterogeneous
environment.”
“The Arcserve system is helping to maximise the availability of
the MK Data Hub, safeguarding the reputation – and ultimately
the success – of the MK:Smart initiative.”
PC PRO review of Arcserve UDP Appliance
“Arcserve UDP has impressed us before, and now you get it in a
purpose-built backup appliance.”…”The setup process is swift: It took
only 21 minutes to add the appliance to our domain”…”The powerful
hardware made it’s presence felt: the 260GB on our domain
controller was secured at an average of 79MB/sec.”
STORAGE MAGAZINE 2016 & 2017:
Data Protection Product of the Year
Arcserve - Unified Data Protection (UDP) v6
Disaster Recovery Product of 2016
IT Pro review of Arcserve UDP Appliance
http://arcserve.com/about/awards/
What Next?
More Information - http://arcserve.com/uk/
– Data Sheets
– White Papers
– Case Studies
Try UDP v6.5 Free - http://arcserve.com/uk/free-backup-software-trial/
Appliance Loan or Try and Buy for testing
UDP Appliance Setup Demo
https://www.youtube.com/watch?v=6O-ocbxqhjw
Arcserve Cloud Walk-Through
https://www.youtube.com/watch?v=DvCqHUykJAc
135
Question & Answers
Copyright © 2015 Arcserve (USA), LLC and its affiliates and
subsidiaries. All rights reserved.. 136
SPOTLIGHT ON
TECHNOLOGY
#SOT17
Customer Panel
Callum Murray – CEO
Neil Johnson – IS Manager
Claudette Jones - CIO
SPOTLIGHT ON
TECHNOLOGY
#SOT17
THANK YOU
Networking
Prize Draw
Drinks by Pure

More Related Content

What's hot

CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingDDoS Mitigation
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital spaceYves Sinka
 

What's hot (12)

Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital space
 

Similar to Spotlight on Technology 2017

Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-programPaige Rasid
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...Dana Gardner
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
The other world of it
The other world of itThe other world of it
The other world of itFing
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 

Similar to Spotlight on Technology 2017 (20)

OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
The other world of it
The other world of itThe other world of it
The other world of it
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Spotlight on Technology 2017

  • 2.
  • 3. Misdirection a form of deception in which the attention of an audience is focused on one thing in order to distract its attention from another. Wikipedia Gartner predicts that by 2018, 10 percent of enterprises will use deception tools and tactics, and actively participate in deception operations against attackers. Honeypot / Honeynet – 2005 “Never attempt to win by force what can be won by deception,” Italian political philosopher Niccolo Machiavelli.
  • 4. Agenda 12.00- 12.40 Registration, meet the exhibitors, tea/coffee 12.40-12.45 Take your seats 12.45-12.55 Welcome and logistics 12.55-13.10 SmartSTEMs 13.10-13.25 Pure Storage Demonstration 13.25-13.45 GDPR with Laura Irvine, BTO Solicitors LLP 13.45-14.00 ZoneFox Demonstration 14.00-14.30 Afternoon Break tea/coffee and donuts 14.30-14.45 Lenovo Demonstration 14.45-15.05 Anatomy of an Attack: Ransomware 15.05-15.20 Trend Micro Demonstration 15.20-15.50 Top Threats and how to manage them 15.50-16.05 Arcserve Demonstration 16.05-16.35 Customer Panel 16.35-17.00 Q&A / Close
  • 6. Title Text Karen Murray Personal Assistant, Events Manager and Volunteer
  • 9. Title TextSmartSTEMs is the glue between Tertiary Education, Industry and Schools. We exist to provide equity of opportunity to young people into STEM (Science Technology Engineering and Mathematics) with particular focus on the gender and skills gap. HUB OUTREACH
  • 10. Title TextSome Numbers • Less than 2 out of 10 ICT employees are female Nesta • Skills gap in Scotland is 7000 people ScotlandIS • 15% Female apprenticeships IT & Telecomms SDS • 9% Female apprenticeships ICT SDS • 10% Female apprenticeships Information Security SDS
  • 12. Title Text • 500 Girls • 200 Volunteers • 83 Workshops • 45 Companies • 8 Partners 3rd June 2015
  • 14. Title TextGirls Engaged through SmartSTEMs 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 2015 2016 2017 500 3000 5000
  • 19. Title Text Emma Cairns SmartSTEMs Scholar “To me, SmartSTEMs means provision for the future: it’s what is necessary to create a talent pipeline that will keep on giving for decades to come.”
  • 20. Title Text #Collaborationiskey • Schools • HE/FE • Industry • Individuals
  • 21. Title Text • Your CSR initiative • Apprenticeship / Talent Pipeline • Succession Planning • Access to schools • Access to HE/FE Establishments • R&D support • Expanding your network SmartSTEMs Can Support YOU
  • 22. Title Text • PR/Media Awareness generally • Volunteering • Using your network • Sources of other future funding for expansion Can you support SmartSTEMs?
  • 28. What’s Magical about the GDPR? Laura Irvine, Partner at BTO Solicitors LLP
  • 29. Puts the Data Subject Back in Control of their Personal Data
  • 30. Provides organisations with a headache as they have more obligations
  • 31. And Provides the ICO with more powers
  • 32. The Hermione Grainger of GDPR Quote: Laura is the hot favourite speaker and font of all things GDPR. Laura actually likes GDPR. !!!!
  • 33. GDPR Magic? Final version published on 4 May 2016 and will be enforced from 25 May 2018. Direct effect throughout the EU. Brexit will have no impact initially and will be unlikely to have an impact in the near future. Will replace the Data Protection Act 1998. Data Protection Bill published today. Other legal changes to watch out for: Police Directive; National Infrastructures Directive, ePrivacy Regulation.
  • 34. GDPR Basics for Organisations Legal Processing – it is not all about consent Fair and Transparent Processing – it is all about providing the data subject with information in relation to what you are doing with their personal data Data Subject Rights – new and enhanced rights Data Protection Officer – a requirement for certain organisations Accountability – responsible for complying with GDPR principles and demonstrating compliance with GDPR principles Controllers and Processors – due diligence, contractual terms
  • 35. GDPR and Security – Sixth Principle Personal data shall be: processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures ‘integrity and confidentiality’
  • 36. Article 32 – Security of Processing Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk.
  • 37. Artcile 32 Specifically Encourages ‘as appropriate’:  pseudonymisation and encryption of personal data;  the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;  the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;  a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing
  • 38. Personal Data Breaches, Reporting and Fines ‘personal data breach’ means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed; Must be reported unless it is unlikely to result in a risk to the rights and freedoms of individuals. Fines of up to € 20 million or 4% global turnover
  • 39. As Albus Dumbledore says: BTO Can Help Contact details: Laura Irvine T: 0131 222 2940 E: lji@bto.co.uk www.bto.co.uk/gdpr
  • 42. Analyze. Detect. Protect. ZoneFox GDPR and the Insider Threat How ZoneFox helps Sam Hampton-Smith Head of UX s.hampton-smith@zonefox.com
  • 43. Who are we? ZoneFox is an award winning market leader in User Behaviour Analytics, providing critical insights around data-flow that you need to secure against the Insider Threat.
  • 44. Analyze. Detect. Protect. Let’s start with basics ● What does compliance look like? ● What is an ‘insider threat’? ● What are they threatening and how does this relate to GDPR? ● How can you tell what is important? ● How can you tell who is important? ● But what about the really clever insider?
  • 45. Analyze. Detect. Protect. What does compliance look like?
  • 46. Analyze. Detect. Protect. What is an ‘insider threat’?
  • 47. Analyze. Detect. Protect. What are they threatening and how does this relate to GDPR?
  • 48. Analyze. Detect. Protect. How can you tell what is important?
  • 49. Analyze. Detect. Protect. How can you tell who is important?
  • 50. Analyze. Detect. Protect. Let’s put this all together...
  • 51. Analyze. Detect. Protect. But what about the really clever insider?
  • 52. Analyze. Detect. Protect. How Does it Work? Peer Group 3 Peer Group 4 Peer Group 2 Peer Group 1 Statistically relevant outlier a.k.a Bad Guy
  • 53. Analyze. Detect. Protect. What does this look like in production?
  • 54. Analyze. Detect. Protect. Key ZoneFox features + Lightweight agent based approach + Non-intrusive - no enforcement or user disruption + Intuitive & flexible business rules (policies) + Flexible web-based user interface + In-built alerting & comprehensive reporting + Full forensic audit trail + On-premise deployment or SaaS
  • 56. Break
  • 60. Anatomy of an Attack: Ransomware
  • 61.
  • 62.
  • 63. • Protect Corporate Mobile phones • Protect Employee Personal phones • Allow connection of phones to PC/Laptop for charging Hands Up
  • 64. • Rooted Android • USB cable Demo
  • 65. • Average $1077 • Phishing is #1 Delivery Mechanism • “I’ll be back” • Patch • Backup • Defend • Least Privilege • Bitcoin wallet 2-3 days to create Ransomware
  • 68. Trend Micro Experienced, Innovative, Market Leader Spotlight on Tech event 14th September 2017 Paul Rickards – Trend Micro Scotland
  • 69. Trend Micro - The company What we do How we do it Who we are EVA CHEN , CEO and Founder Founded: 1988 Offices: 37 Employees: 6000+ Revenues: $1.2Bn Cash Assets: $1.65Bn Headquarters: Tokyo Recognised leader in endpoint, server, virtualisation and cloud security Protecting the exchange of digital information for Businesses and Consumers Innovative security solutions 1,200 threat experts in 12 TrendLabs locations around the globe, 1,492 R&D Engineers $400M USD and 500 Engineers invested in last 4 years to develop cloud-related solutions Global Threat Intelligence with Smart Protection Network 155million+ endpoints protected500,000+ commercial customers protected
  • 70. Copyright 2017 Trend Micro Inc.70 LAN Server Security 1995 2000 2005 201520101990 LAN Server Security Leading Consumer Anti-Virus MSN Hotmail Protection Gateway Security Integrated Virtualization Security Cloud Computing Security Advanced Threat Detection Network DefenseSmart Protection Network 28 Years of Innovation
  • 71. Copyright 2017 Trend Micro Inc.71 Innovative and Timely Response to Evolving Threat Landscape Anti- malware Personal Firewall Anti- spyware High-Fidelity Machine Learning Sandbox Analysis Application Control Exploit Prevention Census Check Data Encryption Data Loss Prevention Behavioral Analysis File Reputation Web Reputation Host-based IPS 28 years of innovation Investigation & Forensics (EDR) Variant Protection Whitelisting Check
  • 72. Copyright 2017 Trend Micro Inc.72 Connected Threat Defense: Better, Faster Protection Gain centralized visibility across the system, and analyze and assess impact of threats Enable rapid response through shared threat intelligence and delivery of real-time security updates Detect advanced malware, behavior and communications invisible to standard defenses Assess potential vulnerabilities and proactively protect endpoints, servers and applications PROTECT DETECT RESPOND
  • 73. Copyright 2017 Trend Micro Inc.73 Growth in Americas Americas 29% EMEA 16% APAC 55%Americas 22% EMEA 18% APAC 60% FY-2012 93.8B ¥ FY-2016 131.936B ¥
  • 74. Copyright 2017 Trend Micro Inc.74 FY-2016 Americas 24% EMEA 20% APAC 56% Growth in Commercial Business Consumer 37% Commercial 63% Consumer 29% Commercial 71% 131.936B ¥ FY-2012 93.8B ¥
  • 75. Copyright 2017 Trend Micro Inc.75 Cloud and Virtualization Consumerization Complex Networks Threats getting through Broader attack surface Limited visibility Stealthier attacks Many points to protect High throughputStrong protection with ability to audit Performance Operational efficiency
  • 76. Copyright 2017 Trend Micro Inc.76 Cloud and Virtualization Consumerization Complex Networks
  • 77. Copyright 2017 Trend Micro Inc.77
  • 78. Copyright 2017 Trend Micro Inc.78 Rik Ferguson – Vice President of Threat Research
  • 79. Copyright 2017 Trend Micro Inc.79 Application Control Behavioral Analysis Response & Containment Intrusion Prevention Machine Learning Sandbox Analysis Integrity Monitoring Anti-Malware & Content Filtering SMART Maximizes protection NEW!
  • 80. Copyright 2017 Trend Micro Inc.80 Application Control Behavioral Analysis Response & Containment Intrusion Prevention Machine Learning Sandbox Analysis Integrity Monitoring Anti-Malware & Content Filtering Application Control Behavioral Analysis Response & Containment Intrusion Prevention Machine Learning Sandbox Analysis Integrity Monitoring Anti-Malware & Content Filtering Application Control Behavioral Analysis Response & Containment Intrusion Prevention Machine Learning Sandbox Analysis Integrity Monitoring Anti-Malware & Content Filtering OPTIMIZED Minimizes IT impact
  • 81. Copyright 2017 Trend Micro Inc.81 CONNECTED Speeds time to protect, detect and respond
  • 82. Copyright 2017 Trend Micro Inc.82 Best Overall Average Score for 2.5 Years Includes performance, protection (prevalent & 0-day) & usability Source: av-test.org Jan 2014 to June 2016 17.13 17.03 16.77 16.20 15.57 15.90 13.50 11.73 0.00 2.00 4.00 6.00 8.00 10.00 12.00 14.00 16.00 18.00 Trend Micro Kaspersky Symantec F-Secure Sophos Intel-McAfee Cylance Microsoft
  • 83. Confidential © 2017 Trend Micro Inc. Gartner Magic Quadrant for Endpoint Protection Platforms January 2017 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://resources.trendmicro.com/Gartner-Magic-Quadrant-Endpoints.html Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 84. Copyright 2017 Trend Micro Inc.84 Forrester Wave: Endpoint Security Suites, Q4 ’16
  • 85. Copyright 2017 Trend Micro Inc.85 The MARKET LEADER in server security for the 7th straight year! Symantec Intel Other 30% CERTIFIED for key environments AND for security EAL 2 Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter, January 2017 #US41867116
  • 86. Copyright 2017 Trend Micro Inc.86 Market Leadership Position The market leader in server security for the 7th straight year Highest and Furthest to the Right in the Leader’s Quadrant in the Gartner Magic Quadrant for Endpoint Protection Platforms, Jan 2017 #1 in protection and performance • Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter, January 2017 #US41867116 • NSS Labs Breach Detection Test Results (2014-2016); NSS NGIPS Test Results, 2016 • http://www.trendmicro.com/us/business/cyber-security/gartner-idps-report/ • https://resources.trendmicro.com/Gartner-Magic-Quadrant- Endpoints.html • av-test.org (Jan 2014 to Dec 2016) Recommended Breach Detection System for 3 straight years, and Recommended Next-generation IPS Leader in Gartner Magic Quadrant for Intrusion Detection and Prevention Systems, January 2017
  • 87. Copyright 2017 Trend Micro Inc.87
  • 88. Copyright 2017 Trend Micro Inc.88 Thank you! paul_rickards@trendmicro.co.uk
  • 90. THE TOP THREATS …& HOW TO MANAGE THEM! Stuart Macdonald - MANAGING DIRECTOR stuart.macdonald@seric.co.uk @stuart_seric SEPTEMBER 14TH 2017 – WILD CABARET
  • 91.
  • 92.
  • 93.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106. • Internal attacks • Phishing & Spear-phishing • A dangerous lack of cyber security knowledge • DDoS attacks • Malware • SQL Injection • BYOD • Legislative Changes • IoT Vulnerabilities • Cross-site script hatching Top Threats… (The Call)
  • 109.
  • 110.
  • 111. 1. Simple Managed Services 2. Straightforward Solutions 3. Flexible Support 4. Professional Services Seric’s Response
  • 112. Managed Services • Phishing Service • Internal Vulnerability Scanning • Web Application Testing • Web Compliance Testing • Mobile Application Testing The Managed Services
  • 113. Solutions (some examples) • All Flash Arrays • End Point Security • Backup and Restoration • Insider Threat Detection • Server and Storage • SIEM Solutions • Et al. Straightforward Solutions
  • 114. Flexible Support Offerings (some examples) • Product Specific • Project Specific • Wraparound Cover / Enablement • Holiday Cover Flexible Support
  • 115. Professional Services – Audit/Assessment • GDPR Readiness • Cyber Essentials / CE+ • CIS20 • Penetration Testing • ISO27001 • PCI-DSS • Et.al Professional Services
  • 116. Professional Services – Consultancy • Business Continuity Planning • Cyber Strategy • Cloud Strategy • Compliance Planning • Cyber Education Professional Services (cont’d)
  • 117. • “I need some Essentials thing for a tender I’m doing” • “I want a Pen Test” • “I don’t know where to start” • “I know loosely what I want to do” • “The board have got no idea” • “I’ve now got one guy on the board breathing down my neck” • “We’ve simply not got the resources or funding” Most Frequent Requests/Comments
  • 118. • Do things with multiple positive outcomes • CE+ an easy win • Educate and manage the business internally • Map out a strategy • Incremental Asks • Speak to the board in a language they understand • Risk Management • Framework of measurement • Evidence your decision making • Local and or Similar Examples • Mini-Audit to highlight gaps • #SericCanHelp Successful Strategies - One thing begets another
  • 119.
  • 120.
  • 124. Unified Data Protection Copyright © 2016 Arcserve (USA), LLC and its affiliates and subsidiaries. All rights reserved.
  • 125. 127 Arcserve Profile A single, fully-integrated solution portfolio to protect across cloud, virtual and physical environments. SOFTWARE APPLIANCES CLOUD (DRaaS) Copyright © 2017 Arcserve. All rights reserved. Worldwide Customer Base & Sales Presence Industry Recognition » 45,000 customers » 25,000+ UDP customers » 7,500 partners » Distributed in 150 countries » WW HQ – Minneapolis, USA » LATAM HQ – São Paulo, Brazil » EMEA HQ – Barcelona » APAC HQ – Singapore » Japan HQ – Tokyo » Sales offices in 20+ countries » 3 VMworld Gold Awards » 2 CRN Channel Chief Awards » Channel Company Top Midmarket Executive » MSPBJ Titan of Technology » 4 Storage Awards » Cloud Hosting DR Product of the Year » Computer Singapore Readers’ Choice Award for Networked Storage » 2 PC Pro Recommendations » 3 IT Pro Recommendations » DCS Storage Software Product of the Year » CRN Woman of the Channel
  • 126. Arcserve UDP Solution Suite “ “Arcserve delivers an unprecedented end-to-end suite of powerful yet elegantly simple availability solutions for the midmarket. Email archive & compliance Enterprise Power – Small Team Simplicity
  • 127. Arcserve® UDP Appliance The first complete & most cost-effective data protection appliance, with Assured RecoveryTM ▪ Provides all the advanced features of Arcserve UDP in a simple, yet powerful appliance ▪ Ideal for customers that require a “set it and forget it” backup and recovery solution ▪ Simple, wizard-driven setup for ease of deployment & usability ▪ Available from 4TB to 80TB of usable Storage ▪ Built-in SSD drive, for maximum deduplication performance ▪ Interoperable with existing UDP software deployments ▪ Arcserve Cloud option provides a complete, offsite backup & DR solution Arcserve UDP 8000 series appliance Copyright © 2015 Arcserve (USA), LLC and its affiliates and subsidiaries. All rights reserved. NEW Each appliance protects as many Windows or Linux servers that will fit on it No extra per-server or per- socket licenses needed **Estimated capacity assuming a typical 3:1 deduplication & compression ratio. Actual backup capacity may vary significantly, based upon data type, backup type, backup schedule etc.
  • 128. Military Grade Encryption for your Backup Data – GDPR Ready Key part of the GDPR guidelines is to safeguard Data to ensure it cannot be lost, stolen or fall into the wrong hands: 256 Bit AES Encryption can be enabled: • On the Backup Destinations • Replicating Backups between Sites • Replicating to the Cloud • SSL Encryption and HTTPS Natively built into Arcserve UDP • Can protect Encrypted VM’s (VSphere 6.5 ready) • Can protect Servers and Workstations with Microsoft Bitlocker enabled Copyright © 2016 Arcserve. All rights reserved.
  • 129. Safeguarding and Securing Email - Office 365 Protection OFFICE 365- USER MAILBOXES WINDOWS PROXY RECOVERY POINT SERVER ADDITIONAL COPIES DISC, TAPE, CLOUD CENTRALIZED MANAGEMENT GRANULAR RESTORE DIRECTLY FROM PRIMARY OR SECONDARY COPY LOCAL SITE OR CLOUD ENVIRONMENT BACKUPS PERFORMED AT LEVEL OF MAILBOXES / STORES SIMPLE DATA STORAGE WITHOUT DEDUPLICATION Office 365 Protection (Exchange) » Eliminate the risk of data loss due to an Office 365 outage or (accidental) user deletion. » Protect the Office 365 emails to local UDP backup or cloud. » Recover Emails, Calendar, Contacts, Tasks, Notes » Can Protect Archive Email and Public Folders » Selectively backup only important folders and exclude others. » Included with per-TB and Appliance pricing models » New subscription purchase for socket customers Copyright © 2017 Arcserve. All rights reserved. Arcserve® UDP
  • 130. Arcserve UDP Archiving Topology 132
  • 131. Award Winning! 133 “Arcserve is the closest to feature-complete that you’re likely to see in the backup space.” “Arcserve UDP was the only system able to recover data over a SAN. It also offered the support for a heterogeneous environment.” “The Arcserve system is helping to maximise the availability of the MK Data Hub, safeguarding the reputation – and ultimately the success – of the MK:Smart initiative.” PC PRO review of Arcserve UDP Appliance “Arcserve UDP has impressed us before, and now you get it in a purpose-built backup appliance.”…”The setup process is swift: It took only 21 minutes to add the appliance to our domain”…”The powerful hardware made it’s presence felt: the 260GB on our domain controller was secured at an average of 79MB/sec.” STORAGE MAGAZINE 2016 & 2017: Data Protection Product of the Year Arcserve - Unified Data Protection (UDP) v6 Disaster Recovery Product of 2016 IT Pro review of Arcserve UDP Appliance http://arcserve.com/about/awards/
  • 132.
  • 133. What Next? More Information - http://arcserve.com/uk/ – Data Sheets – White Papers – Case Studies Try UDP v6.5 Free - http://arcserve.com/uk/free-backup-software-trial/ Appliance Loan or Try and Buy for testing UDP Appliance Setup Demo https://www.youtube.com/watch?v=6O-ocbxqhjw Arcserve Cloud Walk-Through https://www.youtube.com/watch?v=DvCqHUykJAc 135
  • 134. Question & Answers Copyright © 2015 Arcserve (USA), LLC and its affiliates and subsidiaries. All rights reserved.. 136
  • 136. Customer Panel Callum Murray – CEO Neil Johnson – IS Manager Claudette Jones - CIO