SlideShare a Scribd company logo
1 of 24
Ex
Lapsys Providence Suite™
BUSINESS SECURITY AND CONTINGENCY
PLANNING FOR LOCAL GOVERNMENT
“SECURE PROTECTION and BUSINESS CONTINUTY
PLANNING with less COMPLEXITY”…
Contingency Planning with Lapsys
Technologies Providence Suite™
“We identify the
challenges of data
Protection through
Risk Management and
Contingency Planning
and minimize the time
you take to protect
your organisation”
Lower Security Risks and
Costs by Maximizing the
Time to Protection…
Lower Security Risks and
Costs by Maximizing the
Time to Protection…
“How much time should I commit our organisation to
Contingency planning?”...Well? Just enough time to
look at Lapsys Providence Suite™
Securing Your infrastructure with LAPSYS
TECHNOLOGIES®
ENTERPRISE SECURITY SOLUTION FOR
LOCAL GOVERNMENT “immediate protection
and Business Continuity Planning with Peace
of mind and less complexity”
Lapsys Providence Suite™ is a tightly
integrated offering of content security products, services,
and solutions optimized to deliver a suite of Business
Continuity components for immediate protection that
improves the organisation procedural contingency
processes automatically.
Lapsys Providence Suite™ also dramatically reduces
the time to acquire, deploy, and manage content
security—reducing both risks and cost of ownership.
Lapsys Providence Suite™
Lapsys Providence Suite™ Business Contingency framework of primary components:
Continuity of Support Plan/IT Contingency Plan which incorporates:
Business Continuity Plan (BCP)
Business Recovery Plan (BRP)
Continuity of Operations Plan (COOP)
Crisis Communications Plan
Cyber Incident Response Plan
Disaster Recovery Plan (DRP)
Occupant Emergency Plan (OEP)
Lapsys Providence Suite™ is a tightly integrated offering of content security products,
services, and solutions optimized to deliver a suite of Business Continuity components for
immediate protection that improves automatically. Lapsys Providence Suite™ also dramatically
reduces the time to acquire, deploy, and manage content security—reducing both risks and
costs.
Lower Security Risks and
Costs by Maximizing the
Time to Protection…
Lapsys Providence Suite™
BCM Components:
Business Continuity Managed Planning
Remote Dual Backup DR Services
Business Contingency Security
BCM Contingency Services
Spam numbers are exploding, malware is becoming an increasing concern, and data-
stealing malware can cause damage without a company even knowing. One misleading
link. One deceptive email. One hijacked Server. One click can compromise your
confidential data, business infrastructure, and good reputation. To make matters worse,
investments in traditional content security products cannot fully protect you against
these latest content security threats. All these continuous threats are not only the
primary disruptions to the daily working practice most events of which are not realized
as a direct impact on the organisation continuity; we have identified just a few:
1: Data Theft
2: Office Flood, Fire
3: Transportation delays
4: Company Data Loss or Corruption
If You Think Your Business Is Safe?—Think Again!
Lower Security Risks and
Costs by Maximizing the
Time to Protection…
ENTERPRISE CONTENT SECURITY THREATS
Cybercriminals are taking advantage of business’ dependence on email and the web
to attack enterprises and steal information and resources. Simple actions like
opening an email attachment or clicking on a web link can result in lost confidential
data, damaged infrastructure, or a ruined reputation.
The content security threat landscape has changed dramatically over the last few
years. Spam is no longer just an annoyance and hackers are not simply creating
malware for notoriety, Instead the focus has shifted to profiting from threats that
steal data and resources. Profit-driven cybercriminals lurk behind most web threats,
creating a new generation of spam and malware based on a powerful underground
economy. To maximize profits, cybercriminals have become more sophisticated,
delivering faster more insidious attacks. And finally, as content security threats have
become more effective, they have dramatically increased in volume.
Content Security Threats Are Profit Driven. According to a survey
recently conducted, over 60 percent of businesses have been hit by cybercrime.
Enterprises are direct targets for cybercriminals, seeking to compromise data and
resources on a larger scale. This has resulted in the rise of targeted attacks
including data-stealing malware, botnet infections, ransom attacks, and other threats
Lower Security Risks and
Costs by Maximizing the
Time to Protection…
The Dramatic Increase in unforeseen disasters
over the last 5 years affecting companies today…
Which of the following are the biggest
information/network security challenges facing
your company?
Understanding risks and
potential disruption without BCP
Base: 754 respondents (2008)
Disruptions experienced
in the previous year
Threats likely to
have a significant
impact on costs
and revenue
Threats
cover
ed
by
BCM
5
2002
%
2003
%
2004
%
2005 2006
%
2007
%
2008
%
2008
%
2008
%
Loss of IT 19 24 25 41 38 39 43 73 39
Loss of people - 26 20 28 29 32 35 59 29
Loss of telecommunications - - 23 28 24 25 30 68 36
Extreme weather e.g. flood/high winds 18 15 10 18 9 28 29 46 31
Loss of key skills 33 16 14 20 19 20 21 62 26
Negative publicity/coverage 24 17 16 17 16 19 18 51 19
Employee health and safety incident 13 9 8 19 13 17 17 44 27
Loss of access to site 5 5 6 11 13 13 16 63 38
Utility outage e.g. electricity, gas, water, sewage - - - 28 19 21 14 54 30
Supply chain disruption 19 11 12 10 10 13 12 37 19
Damage to corporate image/ reputation/brand 15 7 8 11 8 11 10 55 19
Industrial action - - - 5 6 7 7 26 16
Environmental incident 9 5 4 7 5 6 7 36 29
Customer health/product safety issue/incident 11 6 4 6 6 6 7 35 21
Pressure group protest 10 7 7 6 7 7 6 27 14
Fire 6 5 5 5 5 6 5 58 33
Terrorist damage 2 1 1 2 3 3 3 53 28
Qualitative Survey conducted on the impact of specific unforeseen incidents
Postal strikes
Flooding
Attempted terror attacks London & Glasgow
Disruption at Heathrow
Influenza
Data Loss
0% 20% 40% 60% 80% 100%
Significant disruption
Minor disruption
Negligible effect
No impact
Contingency Planning with Lapsys
Technologies Providence Suite™
“We identify the
challenges of data
Protection through
Risk Management and
Contingency Planning
and minimize the time
you take to protect
your organisation”
Lower Security Risks and
Costs by Maximizing the
Time to Protection…
“THE IMPLICATIONS FOR ANY
ORGANIZATION FACED WITH POTENTIAL
RISKS SUCH AS FIRE, THEFT, FLOOD AND
TERRORIST ATTACKS ARE HUGE”.
Did you know?…
• “46% of FTSE 250 companies said it would
take less than a day for a serious disruption
to impact significantly on their business.”
• “While 46% of businesses are required by
customers to show they have business
continuity measures in place, three quarters
now ask their own suppliers to do the same.”
Lower Security Risks and
Costs by Maximizing the
Time to Protection…
Lapsys Providence Suite™
Securing Your infrastructure with LAPSYS TECHNOLOGIES®
ENTERPRISE SECURITY COMPLIANCE FOR LOCAL GOVERNMENT
Compliance and Other Industry Regulations. Compliance is one of the top issues
driving security expenditures. New rules have added concerns over patient records,
customer data, and loss of intellectual property. One of the most effective ways enterprises
are getting better business value from security is aligning security investments with
business and compliance objectives.
Outsourcing, Partnering, and Customer Collaboration. Today, business growth relies
on sharing data with partners, suppliers, outsourcers, and through collaboration with
customers. To be efficient and ultimately successful enterprises have opened their
networks to third parties for joint collaboration, adding another layer of risk.
Ineffective Defence with a Patchwork of Point Products. The new generation of content
security challenges has resulted in a wide range of security products—many of them
narrowly focused on one security issue. But instead of solving the problem, the resulting
point-product sprawl makes it worse with constant deployment, administration, and support
demands. Managing this complexity often poses greater problems than the threats
themselves.
BS25999 British standard for business continuity management (BCM)
Managed Services
Portfolio Management
Project and Service Management
Our mission statement…
“We deliver professional, IT led
Business Continuity Planning solutions
through relationships based on
respect, commitment and excellence”.
“Business Continuity Planning with less
Complexity…”
So make the right move… with..
Lapsys Providence Suite™..
“Delivering Business Continuity Planning to Local Government
with less Complexity…”
Future events
Unified Communications Expo 2009:
With so many applications and features on the market today, potential buyers are faced
with many issues when trying to make a decision about investing in UC technology.
The Unified Communications & Messaging Theatre will show how they can gather
support from their organisation, and the business performance advantages UC offers in
a developing SECURITY COMMS market.
Client Portfolio
Vendor Partner endorsements
BS25999 British standard for
Business Continuity Management
(BCM)
• Lapsys Technologies Limited
• Business Continuity Management Service
• “Providence Suite™ Business Continuity Planning
• with Less Complexity…”
• T: +44 (0) 20 7160 9740
• E: bcm@lapsys.co.uk
• url: www.lapsys.co.uk

More Related Content

What's hot

2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudTechSoup
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
 
College Presentation
College PresentationCollege Presentation
College Presentationscottfrost
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014- Mark - Fullbright
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small BusinessValiant Technology
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Henry Draughon
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignmentharinathinfotech
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Why network based security
Why network based securityWhy network based security
Why network based securityAlan Rudd
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 

What's hot (20)

2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the Cloud
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
College Presentation
College PresentationCollege Presentation
College Presentation
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
 
Cyber security
Cyber securityCyber security
Cyber security
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignment
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Why network based security
Why network based securityWhy network based security
Why network based security
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 

Viewers also liked

Erick cisneros
Erick cisnerosErick cisneros
Erick cisneroserickcs208
 
Docs at lok nayak down with swine flu
Docs at lok nayak down with swine fluDocs at lok nayak down with swine flu
Docs at lok nayak down with swine fluNursing Hi Nursing
 
Trien Khai He Dieu Hanh Doanh Nghiep Bfo Cho Plc Wave V1
Trien Khai He Dieu Hanh Doanh Nghiep Bfo Cho Plc Wave V1Trien Khai He Dieu Hanh Doanh Nghiep Bfo Cho Plc Wave V1
Trien Khai He Dieu Hanh Doanh Nghiep Bfo Cho Plc Wave V1Hieutanda Nguyen Khac Hieu
 
To name a brand
To name a brandTo name a brand
To name a brandThan Toan
 
Presentation- E.Cape mapping case study_ ECD CoP meeting- 8 April 2014
Presentation- E.Cape mapping case study_ ECD CoP meeting- 8 April 2014Presentation- E.Cape mapping case study_ ECD CoP meeting- 8 April 2014
Presentation- E.Cape mapping case study_ ECD CoP meeting- 8 April 2014kaleylemottee
 
8. vasiliniuc i., patriche c. soil structural degradation risk in horoiata ...
8. vasiliniuc i., patriche c.   soil structural degradation risk in horoiata ...8. vasiliniuc i., patriche c.   soil structural degradation risk in horoiata ...
8. vasiliniuc i., patriche c. soil structural degradation risk in horoiata ...Vasiliniuc Ionut
 
Textual analysis
Textual analysis Textual analysis
Textual analysis amberbush
 
Internet và mobile internet 2011 – 2012 kpcb
Internet và mobile internet 2011 – 2012 kpcbInternet và mobile internet 2011 – 2012 kpcb
Internet và mobile internet 2011 – 2012 kpcbDung Tri
 
Water, Water Everywhere
Water, Water EverywhereWater, Water Everywhere
Water, Water EverywhereNichole
 
Pagerank (1)
Pagerank (1)Pagerank (1)
Pagerank (1)Fabricio
 
Travelers Is It Better Under The Umbrella
Travelers Is It Better Under The Umbrella Travelers Is It Better Under The Umbrella
Travelers Is It Better Under The Umbrella Robert Xavier
 
Polish students family
Polish students familyPolish students family
Polish students familykasiaszery
 
Mot Cau Chuyen That Dep
Mot Cau Chuyen That DepMot Cau Chuyen That Dep
Mot Cau Chuyen That DepNhan Nguyen
 

Viewers also liked (18)

Erick cisneros
Erick cisnerosErick cisneros
Erick cisneros
 
Booking quảng cáo
Booking quảng cáoBooking quảng cáo
Booking quảng cáo
 
Docs at lok nayak down with swine flu
Docs at lok nayak down with swine fluDocs at lok nayak down with swine flu
Docs at lok nayak down with swine flu
 
Mail Shot
Mail ShotMail Shot
Mail Shot
 
Trien Khai He Dieu Hanh Doanh Nghiep Bfo Cho Plc Wave V1
Trien Khai He Dieu Hanh Doanh Nghiep Bfo Cho Plc Wave V1Trien Khai He Dieu Hanh Doanh Nghiep Bfo Cho Plc Wave V1
Trien Khai He Dieu Hanh Doanh Nghiep Bfo Cho Plc Wave V1
 
To name a brand
To name a brandTo name a brand
To name a brand
 
Test pres 09_2010
Test pres 09_2010Test pres 09_2010
Test pres 09_2010
 
Presentation- E.Cape mapping case study_ ECD CoP meeting- 8 April 2014
Presentation- E.Cape mapping case study_ ECD CoP meeting- 8 April 2014Presentation- E.Cape mapping case study_ ECD CoP meeting- 8 April 2014
Presentation- E.Cape mapping case study_ ECD CoP meeting- 8 April 2014
 
8. vasiliniuc i., patriche c. soil structural degradation risk in horoiata ...
8. vasiliniuc i., patriche c.   soil structural degradation risk in horoiata ...8. vasiliniuc i., patriche c.   soil structural degradation risk in horoiata ...
8. vasiliniuc i., patriche c. soil structural degradation risk in horoiata ...
 
Daniel
DanielDaniel
Daniel
 
Textual analysis
Textual analysis Textual analysis
Textual analysis
 
Internet và mobile internet 2011 – 2012 kpcb
Internet và mobile internet 2011 – 2012 kpcbInternet và mobile internet 2011 – 2012 kpcb
Internet và mobile internet 2011 – 2012 kpcb
 
Water, Water Everywhere
Water, Water EverywhereWater, Water Everywhere
Water, Water Everywhere
 
Base expo
Base expoBase expo
Base expo
 
Pagerank (1)
Pagerank (1)Pagerank (1)
Pagerank (1)
 
Travelers Is It Better Under The Umbrella
Travelers Is It Better Under The Umbrella Travelers Is It Better Under The Umbrella
Travelers Is It Better Under The Umbrella
 
Polish students family
Polish students familyPolish students family
Polish students family
 
Mot Cau Chuyen That Dep
Mot Cau Chuyen That DepMot Cau Chuyen That Dep
Mot Cau Chuyen That Dep
 

Similar to BCP Expo Presentation and company overview final ver. 1.0

What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperTom Salmon
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Mark Baker
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Mark Baker
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAegify Inc.
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesSeqrite
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security DemistyifiedMicrosoft UK
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
BBOX Business Risk
BBOX Business RiskBBOX Business Risk
BBOX Business RiskBrad Foster
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureDave James
 

Similar to BCP Expo Presentation and company overview final ver. 1.0 (20)

What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector Whitepaper
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
BBOX Business Risk
BBOX Business RiskBBOX Business Risk
BBOX Business Risk
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 

More from Julian Samuels

Introduction Blackwater Tech Microsoft 365 ERP v1.1
Introduction Blackwater Tech Microsoft 365 ERP v1.1Introduction Blackwater Tech Microsoft 365 ERP v1.1
Introduction Blackwater Tech Microsoft 365 ERP v1.1Julian Samuels
 
Julian Samuels - Second image international
Julian Samuels - Second image internationalJulian Samuels - Second image international
Julian Samuels - Second image internationalJulian Samuels
 
Broadbean Presentation v1.0
Broadbean Presentation v1.0Broadbean Presentation v1.0
Broadbean Presentation v1.0Julian Samuels
 
CI Phantom Sponsor presentation as at the 11th December 2014 ver 1.0
CI Phantom Sponsor presentation as at the 11th December 2014 ver 1.0CI Phantom Sponsor presentation as at the 11th December 2014 ver 1.0
CI Phantom Sponsor presentation as at the 11th December 2014 ver 1.0Julian Samuels
 
Agile Methodology - Data Migration v1.0
Agile Methodology - Data Migration v1.0Agile Methodology - Data Migration v1.0
Agile Methodology - Data Migration v1.0Julian Samuels
 
About Health presentation v1.0
About Health presentation v1.0About Health presentation v1.0
About Health presentation v1.0Julian Samuels
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
Wooldridge Group - Storyworldwide Presentation v1.0
Wooldridge Group - Storyworldwide Presentation v1.0Wooldridge Group - Storyworldwide Presentation v1.0
Wooldridge Group - Storyworldwide Presentation v1.0Julian Samuels
 
About Health presentation v1.0
About Health presentation v1.0About Health presentation v1.0
About Health presentation v1.0Julian Samuels
 

More from Julian Samuels (9)

Introduction Blackwater Tech Microsoft 365 ERP v1.1
Introduction Blackwater Tech Microsoft 365 ERP v1.1Introduction Blackwater Tech Microsoft 365 ERP v1.1
Introduction Blackwater Tech Microsoft 365 ERP v1.1
 
Julian Samuels - Second image international
Julian Samuels - Second image internationalJulian Samuels - Second image international
Julian Samuels - Second image international
 
Broadbean Presentation v1.0
Broadbean Presentation v1.0Broadbean Presentation v1.0
Broadbean Presentation v1.0
 
CI Phantom Sponsor presentation as at the 11th December 2014 ver 1.0
CI Phantom Sponsor presentation as at the 11th December 2014 ver 1.0CI Phantom Sponsor presentation as at the 11th December 2014 ver 1.0
CI Phantom Sponsor presentation as at the 11th December 2014 ver 1.0
 
Agile Methodology - Data Migration v1.0
Agile Methodology - Data Migration v1.0Agile Methodology - Data Migration v1.0
Agile Methodology - Data Migration v1.0
 
About Health presentation v1.0
About Health presentation v1.0About Health presentation v1.0
About Health presentation v1.0
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
Wooldridge Group - Storyworldwide Presentation v1.0
Wooldridge Group - Storyworldwide Presentation v1.0Wooldridge Group - Storyworldwide Presentation v1.0
Wooldridge Group - Storyworldwide Presentation v1.0
 
About Health presentation v1.0
About Health presentation v1.0About Health presentation v1.0
About Health presentation v1.0
 

BCP Expo Presentation and company overview final ver. 1.0

  • 1. Ex Lapsys Providence Suite™ BUSINESS SECURITY AND CONTINGENCY PLANNING FOR LOCAL GOVERNMENT “SECURE PROTECTION and BUSINESS CONTINUTY PLANNING with less COMPLEXITY”…
  • 2. Contingency Planning with Lapsys Technologies Providence Suite™ “We identify the challenges of data Protection through Risk Management and Contingency Planning and minimize the time you take to protect your organisation” Lower Security Risks and Costs by Maximizing the Time to Protection…
  • 3. Lower Security Risks and Costs by Maximizing the Time to Protection… “How much time should I commit our organisation to Contingency planning?”...Well? Just enough time to look at Lapsys Providence Suite™
  • 4. Securing Your infrastructure with LAPSYS TECHNOLOGIES® ENTERPRISE SECURITY SOLUTION FOR LOCAL GOVERNMENT “immediate protection and Business Continuity Planning with Peace of mind and less complexity” Lapsys Providence Suite™ is a tightly integrated offering of content security products, services, and solutions optimized to deliver a suite of Business Continuity components for immediate protection that improves the organisation procedural contingency processes automatically. Lapsys Providence Suite™ also dramatically reduces the time to acquire, deploy, and manage content security—reducing both risks and cost of ownership. Lapsys Providence Suite™
  • 5. Lapsys Providence Suite™ Business Contingency framework of primary components: Continuity of Support Plan/IT Contingency Plan which incorporates: Business Continuity Plan (BCP) Business Recovery Plan (BRP) Continuity of Operations Plan (COOP) Crisis Communications Plan Cyber Incident Response Plan Disaster Recovery Plan (DRP) Occupant Emergency Plan (OEP) Lapsys Providence Suite™ is a tightly integrated offering of content security products, services, and solutions optimized to deliver a suite of Business Continuity components for immediate protection that improves automatically. Lapsys Providence Suite™ also dramatically reduces the time to acquire, deploy, and manage content security—reducing both risks and costs. Lower Security Risks and Costs by Maximizing the Time to Protection…
  • 6. Lapsys Providence Suite™ BCM Components: Business Continuity Managed Planning Remote Dual Backup DR Services Business Contingency Security BCM Contingency Services
  • 7. Spam numbers are exploding, malware is becoming an increasing concern, and data- stealing malware can cause damage without a company even knowing. One misleading link. One deceptive email. One hijacked Server. One click can compromise your confidential data, business infrastructure, and good reputation. To make matters worse, investments in traditional content security products cannot fully protect you against these latest content security threats. All these continuous threats are not only the primary disruptions to the daily working practice most events of which are not realized as a direct impact on the organisation continuity; we have identified just a few: 1: Data Theft 2: Office Flood, Fire 3: Transportation delays 4: Company Data Loss or Corruption If You Think Your Business Is Safe?—Think Again! Lower Security Risks and Costs by Maximizing the Time to Protection…
  • 8. ENTERPRISE CONTENT SECURITY THREATS Cybercriminals are taking advantage of business’ dependence on email and the web to attack enterprises and steal information and resources. Simple actions like opening an email attachment or clicking on a web link can result in lost confidential data, damaged infrastructure, or a ruined reputation. The content security threat landscape has changed dramatically over the last few years. Spam is no longer just an annoyance and hackers are not simply creating malware for notoriety, Instead the focus has shifted to profiting from threats that steal data and resources. Profit-driven cybercriminals lurk behind most web threats, creating a new generation of spam and malware based on a powerful underground economy. To maximize profits, cybercriminals have become more sophisticated, delivering faster more insidious attacks. And finally, as content security threats have become more effective, they have dramatically increased in volume. Content Security Threats Are Profit Driven. According to a survey recently conducted, over 60 percent of businesses have been hit by cybercrime. Enterprises are direct targets for cybercriminals, seeking to compromise data and resources on a larger scale. This has resulted in the rise of targeted attacks including data-stealing malware, botnet infections, ransom attacks, and other threats Lower Security Risks and Costs by Maximizing the Time to Protection…
  • 9. The Dramatic Increase in unforeseen disasters over the last 5 years affecting companies today…
  • 10. Which of the following are the biggest information/network security challenges facing your company?
  • 11. Understanding risks and potential disruption without BCP Base: 754 respondents (2008) Disruptions experienced in the previous year Threats likely to have a significant impact on costs and revenue Threats cover ed by BCM 5 2002 % 2003 % 2004 % 2005 2006 % 2007 % 2008 % 2008 % 2008 % Loss of IT 19 24 25 41 38 39 43 73 39 Loss of people - 26 20 28 29 32 35 59 29 Loss of telecommunications - - 23 28 24 25 30 68 36 Extreme weather e.g. flood/high winds 18 15 10 18 9 28 29 46 31 Loss of key skills 33 16 14 20 19 20 21 62 26 Negative publicity/coverage 24 17 16 17 16 19 18 51 19 Employee health and safety incident 13 9 8 19 13 17 17 44 27 Loss of access to site 5 5 6 11 13 13 16 63 38 Utility outage e.g. electricity, gas, water, sewage - - - 28 19 21 14 54 30 Supply chain disruption 19 11 12 10 10 13 12 37 19 Damage to corporate image/ reputation/brand 15 7 8 11 8 11 10 55 19 Industrial action - - - 5 6 7 7 26 16 Environmental incident 9 5 4 7 5 6 7 36 29 Customer health/product safety issue/incident 11 6 4 6 6 6 7 35 21 Pressure group protest 10 7 7 6 7 7 6 27 14 Fire 6 5 5 5 5 6 5 58 33 Terrorist damage 2 1 1 2 3 3 3 53 28
  • 12. Qualitative Survey conducted on the impact of specific unforeseen incidents Postal strikes Flooding Attempted terror attacks London & Glasgow Disruption at Heathrow Influenza Data Loss 0% 20% 40% 60% 80% 100% Significant disruption Minor disruption Negligible effect No impact
  • 13. Contingency Planning with Lapsys Technologies Providence Suite™ “We identify the challenges of data Protection through Risk Management and Contingency Planning and minimize the time you take to protect your organisation” Lower Security Risks and Costs by Maximizing the Time to Protection…
  • 14. “THE IMPLICATIONS FOR ANY ORGANIZATION FACED WITH POTENTIAL RISKS SUCH AS FIRE, THEFT, FLOOD AND TERRORIST ATTACKS ARE HUGE”. Did you know?… • “46% of FTSE 250 companies said it would take less than a day for a serious disruption to impact significantly on their business.” • “While 46% of businesses are required by customers to show they have business continuity measures in place, three quarters now ask their own suppliers to do the same.” Lower Security Risks and Costs by Maximizing the Time to Protection…
  • 15. Lapsys Providence Suite™ Securing Your infrastructure with LAPSYS TECHNOLOGIES® ENTERPRISE SECURITY COMPLIANCE FOR LOCAL GOVERNMENT Compliance and Other Industry Regulations. Compliance is one of the top issues driving security expenditures. New rules have added concerns over patient records, customer data, and loss of intellectual property. One of the most effective ways enterprises are getting better business value from security is aligning security investments with business and compliance objectives. Outsourcing, Partnering, and Customer Collaboration. Today, business growth relies on sharing data with partners, suppliers, outsourcers, and through collaboration with customers. To be efficient and ultimately successful enterprises have opened their networks to third parties for joint collaboration, adding another layer of risk. Ineffective Defence with a Patchwork of Point Products. The new generation of content security challenges has resulted in a wide range of security products—many of them narrowly focused on one security issue. But instead of solving the problem, the resulting point-product sprawl makes it worse with constant deployment, administration, and support demands. Managing this complexity often poses greater problems than the threats themselves. BS25999 British standard for business continuity management (BCM)
  • 18. Project and Service Management
  • 19. Our mission statement… “We deliver professional, IT led Business Continuity Planning solutions through relationships based on respect, commitment and excellence”.
  • 20. “Business Continuity Planning with less Complexity…” So make the right move… with.. Lapsys Providence Suite™.. “Delivering Business Continuity Planning to Local Government with less Complexity…”
  • 21. Future events Unified Communications Expo 2009: With so many applications and features on the market today, potential buyers are faced with many issues when trying to make a decision about investing in UC technology. The Unified Communications & Messaging Theatre will show how they can gather support from their organisation, and the business performance advantages UC offers in a developing SECURITY COMMS market.
  • 23. Vendor Partner endorsements BS25999 British standard for Business Continuity Management (BCM)
  • 24. • Lapsys Technologies Limited • Business Continuity Management Service • “Providence Suite™ Business Continuity Planning • with Less Complexity…” • T: +44 (0) 20 7160 9740 • E: bcm@lapsys.co.uk • url: www.lapsys.co.uk