SlideShare a Scribd company logo
1 of 18
Cloud Security
For Retail01
How Not To Make
The Headlines:
Kevin Linsell
Director, Strategy & Architecture
Adapt
Richard Cassidy
Technical Director
Alert Logic
5 Ways To Kill The
Cyber Security Threat
How Not To Make The Headlines...
Kevin Linsell
Director, Strategy & Architecture
Adapt
What’s Going On Out There?
04 Cloud: The Retail Enabler04
Source: IDC FutureScape, 2015
as many retailers as now
will explicitly underpin
their customer and
operations strategies on
3rd platform technologies
by 2017
3x
Cloud Adoption Trends05
Sources:
1. Cloud Industry Forum, 2015 (n=250)
2. Adapt Cloud Adoption Survey, 2015 (n=200)
2
years on:
84%
of UK businesses use cloud
services today1
48 53 61 69 78 84
52 47 39 31 22 16
0%
20%
40%
60%
80%
100%
2010 2011 2012 2013 2014 2015
And 78%
use more
than one
cloud-based
service1
32%
22%
35%
43%
16% 29%
7% 7%
9% 8%
2014 2015
One Two Three Four Five+
38%will increase their
cloud adoption
25%will refine their cloud
environment
18%will transform their
cloud environment2
An Evolving Landscape06
Early 2000s Mid 2000s 2015 & Beyond
Always
Online
Smartphone
Revolution
End Of The
Dot.com
In Pursuit Of
Omni-Channel
Shopping Trolley
Goes Mobile
Brick & Mortar +
1-Way Online
HybridVirtualPhysical
Advanced, Multi
Vector Attacks
Proliferation &
Organisation
Basic Malware,
Solo Mischief
Consumer
Technology
Data Centre
Retail
Threats &
Attacks
07 Stats That Keep You Up At Night…07
Sources: 1. The UK Cyber Security Strategy: Landscape Review – NAO 2013
2. ACI Worldwide, 2014
Almost 33% of online consumers don’t
trust retail security2
£35,000 to £65,000 is the average cost of
SME cyber/data loss1
The cost of cyber crime in the UK in 2013 was estimated to be between
£18 billion & £27 billion1
7,000 Distributed Denial of Service (DDoS)
attacks daily1
For larger businesses, the average cost is
£450,000 to £850,0001
Richard Cassidy
Technical Director, Alert Logic
The Retail Cyber Kill Chain
09 The Retail Cyber Kill Chain
1 – IDC Worldwide Security and Vulnerability Management 2014–2018 Forecast
2 – M-Trends 2015: A View from the Front Lines
Attacks are multi-stage using multiple threat
vectors
On average, it takes organizations 205 days to
identify they have been compromised1
Over two-thirds of organizations find out from
a 3rd partythey have been compromised2
IDENTIFY
& RECON
INITIAL
ATTACK
COMMAND
& CONTROL
DISCOVER/
SPREAD
EXTRACT/
EXFILTRATE
010 Cybercrime: The Main Offenders
Cyber Criminal
Hacktivist APT
011 Cybercrime: The Main Enablers
Anonymity
Crypto Currencies
Underground Market
012 Have You Been Affected?
Source: Alert Logic CSR 2015. n=3026
39%
24%
22%
9%
6%
App Attack Brute Force Suspicious Activity Recon Trojan
013 Why Are You Of Interest?
Large volumes of
personal/ financial data
eCommerce
Application
Diverse, physically
insecure infrastructure
Richard Cassidy
Technical Director, Alert Logic
Kevin Linsell
Director, Strategy & Architecture, Adapt
How To Kill The Cyber
Security Threat
015 Continuous, End-to-End Protection
Continuous
protection
from threat &
exposure
Threat
Intelligence
& Security
Content
24 x 7
Monitoring
&
Escalation
Your IT
Environment
Cloud, Hybrid
On-Premises
Network Events &
Vulnerability
Scanning
Log Data
Web Application
Events
Data
Collection
Big Data
Analytics
Platform
016 5 Ways To Kill The Cyber Security Threat
Stay Informed &…
Best Practice
 Secure your
applications first
 Create robust
access management
policies
 Adopt a patch
management
approach
 Review logs
regularly
 Build a security
toolkit
1 Assume the worst can (and will!) happen
2 Fully assess what is at risk
3 Give responsibility to the right people
4 Plan for rapid recovery
5 View strong risk mgmt & security as an enabler
017 Security: A Shared Responsibility
ServiceProviderResponsibility
Foundation Services
(ISO 27001 compliant)
Hypervisor & OS
• Firewall & perimeter security services
• Segregation of Adapt & Customer Networks
• Regular Pen-tested network
• Accredited platform design & build
• Controlled access for customers
• Guest OS hardening
• Patch management
• Infrastructure updates
• Client access management
• Permission policies
• Security monitoring
• Log analysis
Apps
• Secure coding and best practices
• Software and virtual patching
• Configuration management
• Access management
• Application level attack monitoring
• Network threat
detection
• Security monitoring
• DDoS ProtectionNetworks
Compute Storage DB Network
CustomerResponsibility
Get in touch:
kevin.linsell@adapt.com
@kevlinsell
@domore_Adapt
Richard Cassidy
rcassidy@alertlogic.com
@rvcassidy
Thanks For Listening!
Visit us at
Adapt.com

More Related Content

What's hot

EMEA Tech Summit Dublin - Winning with SolidFire
EMEA Tech Summit Dublin - Winning with SolidFire EMEA Tech Summit Dublin - Winning with SolidFire
EMEA Tech Summit Dublin - Winning with SolidFire NetApp
 
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoiceTOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoicePeak 10
 
Navigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automationNavigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automationPuppet
 
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...Codit
 
Looking at a Body Camera Initiative from an IT Infrastructure Perspective
Looking at a Body Camera Initiative from an IT Infrastructure PerspectiveLooking at a Body Camera Initiative from an IT Infrastructure Perspective
Looking at a Body Camera Initiative from an IT Infrastructure PerspectiveePlus
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed ServicesThe TNS Group
 
Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Steve Lamb
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any BusinessePlus
 
Incorporate, don't alieante, Shadow IT
Incorporate, don't alieante, Shadow ITIncorporate, don't alieante, Shadow IT
Incorporate, don't alieante, Shadow ITGravitant, Inc.
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the CloudGravitant, Inc.
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10
 
Discover how the cloud will empower every organization on the planet to achie...
Discover how the cloud will empower every organization on the planet to achie...Discover how the cloud will empower every organization on the planet to achie...
Discover how the cloud will empower every organization on the planet to achie...Codit
 
[Webinar] When It Comes To Cloud, Great Power Brings Great Responsibility
[Webinar] When It Comes To Cloud, Great Power Brings Great Responsibility[Webinar] When It Comes To Cloud, Great Power Brings Great Responsibility
[Webinar] When It Comes To Cloud, Great Power Brings Great ResponsibilityOpsRamp
 
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...VMware Tanzu
 
Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 PT Datacomm Diangraha
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaAccenture Italia
 
Mindtree IMS Secret Sauce (Fact sheet)
Mindtree IMS Secret Sauce (Fact sheet)Mindtree IMS Secret Sauce (Fact sheet)
Mindtree IMS Secret Sauce (Fact sheet)Koushik Ramani
 
8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS TakeawaysOpsRamp
 
Groth data of-cloud
Groth data of-cloudGroth data of-cloud
Groth data of-cloudStudying
 

What's hot (20)

EMEA Tech Summit Dublin - Winning with SolidFire
EMEA Tech Summit Dublin - Winning with SolidFire EMEA Tech Summit Dublin - Winning with SolidFire
EMEA Tech Summit Dublin - Winning with SolidFire
 
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoiceTOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
 
Navigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automationNavigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automation
 
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
 
Looking at a Body Camera Initiative from an IT Infrastructure Perspective
Looking at a Body Camera Initiative from an IT Infrastructure PerspectiveLooking at a Body Camera Initiative from an IT Infrastructure Perspective
Looking at a Body Camera Initiative from an IT Infrastructure Perspective
 
Cloud Managed Services
Cloud Managed ServicesCloud Managed Services
Cloud Managed Services
 
Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
Incorporate, don't alieante, Shadow IT
Incorporate, don't alieante, Shadow ITIncorporate, don't alieante, Shadow IT
Incorporate, don't alieante, Shadow IT
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the Cloud
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
Discover how the cloud will empower every organization on the planet to achie...
Discover how the cloud will empower every organization on the planet to achie...Discover how the cloud will empower every organization on the planet to achie...
Discover how the cloud will empower every organization on the planet to achie...
 
[Webinar] When It Comes To Cloud, Great Power Brings Great Responsibility
[Webinar] When It Comes To Cloud, Great Power Brings Great Responsibility[Webinar] When It Comes To Cloud, Great Power Brings Great Responsibility
[Webinar] When It Comes To Cloud, Great Power Brings Great Responsibility
 
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
 
Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0 Cloud computing for making indonesia 4.0
Cloud computing for making indonesia 4.0
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
 
Mindtree IMS Secret Sauce (Fact sheet)
Mindtree IMS Secret Sauce (Fact sheet)Mindtree IMS Secret Sauce (Fact sheet)
Mindtree IMS Secret Sauce (Fact sheet)
 
8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways8 Gartner ITOSSS Takeaways
8 Gartner ITOSSS Takeaways
 
Groth data of-cloud
Groth data of-cloudGroth data of-cloud
Groth data of-cloud
 

Similar to Retail Week: Cloud Security

Securing Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderSecuring Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderDatapipe
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...IDC Italy
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsIDC Italy
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
AWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI reportAWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI reportAWS Chicago
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
Evolving Security in Process Control - Cyber Security for Critical Assets 2015
Evolving Security in Process Control - Cyber Security for Critical Assets 2015Evolving Security in Process Control - Cyber Security for Critical Assets 2015
Evolving Security in Process Control - Cyber Security for Critical Assets 2015Lockheed-Martin
 

Similar to Retail Week: Cloud Security (20)

Securing Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderSecuring Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service Provider
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
AWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI reportAWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI report
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Evolving Security in Process Control - Cyber Security for Critical Assets 2015
Evolving Security in Process Control - Cyber Security for Critical Assets 2015Evolving Security in Process Control - Cyber Security for Critical Assets 2015
Evolving Security in Process Control - Cyber Security for Critical Assets 2015
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Retail Week: Cloud Security

  • 1. Cloud Security For Retail01 How Not To Make The Headlines: Kevin Linsell Director, Strategy & Architecture Adapt Richard Cassidy Technical Director Alert Logic 5 Ways To Kill The Cyber Security Threat
  • 2. How Not To Make The Headlines...
  • 3. Kevin Linsell Director, Strategy & Architecture Adapt What’s Going On Out There?
  • 4. 04 Cloud: The Retail Enabler04 Source: IDC FutureScape, 2015 as many retailers as now will explicitly underpin their customer and operations strategies on 3rd platform technologies by 2017 3x
  • 5. Cloud Adoption Trends05 Sources: 1. Cloud Industry Forum, 2015 (n=250) 2. Adapt Cloud Adoption Survey, 2015 (n=200) 2 years on: 84% of UK businesses use cloud services today1 48 53 61 69 78 84 52 47 39 31 22 16 0% 20% 40% 60% 80% 100% 2010 2011 2012 2013 2014 2015 And 78% use more than one cloud-based service1 32% 22% 35% 43% 16% 29% 7% 7% 9% 8% 2014 2015 One Two Three Four Five+ 38%will increase their cloud adoption 25%will refine their cloud environment 18%will transform their cloud environment2
  • 6. An Evolving Landscape06 Early 2000s Mid 2000s 2015 & Beyond Always Online Smartphone Revolution End Of The Dot.com In Pursuit Of Omni-Channel Shopping Trolley Goes Mobile Brick & Mortar + 1-Way Online HybridVirtualPhysical Advanced, Multi Vector Attacks Proliferation & Organisation Basic Malware, Solo Mischief Consumer Technology Data Centre Retail Threats & Attacks
  • 7. 07 Stats That Keep You Up At Night…07 Sources: 1. The UK Cyber Security Strategy: Landscape Review – NAO 2013 2. ACI Worldwide, 2014 Almost 33% of online consumers don’t trust retail security2 £35,000 to £65,000 is the average cost of SME cyber/data loss1 The cost of cyber crime in the UK in 2013 was estimated to be between £18 billion & £27 billion1 7,000 Distributed Denial of Service (DDoS) attacks daily1 For larger businesses, the average cost is £450,000 to £850,0001
  • 8. Richard Cassidy Technical Director, Alert Logic The Retail Cyber Kill Chain
  • 9. 09 The Retail Cyber Kill Chain 1 – IDC Worldwide Security and Vulnerability Management 2014–2018 Forecast 2 – M-Trends 2015: A View from the Front Lines Attacks are multi-stage using multiple threat vectors On average, it takes organizations 205 days to identify they have been compromised1 Over two-thirds of organizations find out from a 3rd partythey have been compromised2 IDENTIFY & RECON INITIAL ATTACK COMMAND & CONTROL DISCOVER/ SPREAD EXTRACT/ EXFILTRATE
  • 10. 010 Cybercrime: The Main Offenders Cyber Criminal Hacktivist APT
  • 11. 011 Cybercrime: The Main Enablers Anonymity Crypto Currencies Underground Market
  • 12. 012 Have You Been Affected? Source: Alert Logic CSR 2015. n=3026 39% 24% 22% 9% 6% App Attack Brute Force Suspicious Activity Recon Trojan
  • 13. 013 Why Are You Of Interest? Large volumes of personal/ financial data eCommerce Application Diverse, physically insecure infrastructure
  • 14. Richard Cassidy Technical Director, Alert Logic Kevin Linsell Director, Strategy & Architecture, Adapt How To Kill The Cyber Security Threat
  • 15. 015 Continuous, End-to-End Protection Continuous protection from threat & exposure Threat Intelligence & Security Content 24 x 7 Monitoring & Escalation Your IT Environment Cloud, Hybrid On-Premises Network Events & Vulnerability Scanning Log Data Web Application Events Data Collection Big Data Analytics Platform
  • 16. 016 5 Ways To Kill The Cyber Security Threat Stay Informed &… Best Practice  Secure your applications first  Create robust access management policies  Adopt a patch management approach  Review logs regularly  Build a security toolkit 1 Assume the worst can (and will!) happen 2 Fully assess what is at risk 3 Give responsibility to the right people 4 Plan for rapid recovery 5 View strong risk mgmt & security as an enabler
  • 17. 017 Security: A Shared Responsibility ServiceProviderResponsibility Foundation Services (ISO 27001 compliant) Hypervisor & OS • Firewall & perimeter security services • Segregation of Adapt & Customer Networks • Regular Pen-tested network • Accredited platform design & build • Controlled access for customers • Guest OS hardening • Patch management • Infrastructure updates • Client access management • Permission policies • Security monitoring • Log analysis Apps • Secure coding and best practices • Software and virtual patching • Configuration management • Access management • Application level attack monitoring • Network threat detection • Security monitoring • DDoS ProtectionNetworks Compute Storage DB Network CustomerResponsibility
  • 18. Get in touch: kevin.linsell@adapt.com @kevlinsell @domore_Adapt Richard Cassidy rcassidy@alertlogic.com @rvcassidy Thanks For Listening! Visit us at Adapt.com