2. INTRODUCTION
• Cybersecurity is the protection of internet-connected systems such as
hardware, software and data from cyberthreats.
• The practice is used by individuals and enterprises to protect against
unauthorized access to data centers and other computerized systems.
• A strong cybersecurity strategy can provide a good security posture against
malicious attacks designed to access, alter, delete, destroy or extort an
organization's or user's systems and sensitive data.
• Cybersecurity is also instrumental in preventing attacks that aim to disable or
disrupt a system's or device's operations.
3. IMPORTANCE OF CYBER SECURITY
• With an increasing number of users, devices and programs in the modern
enterprise, combined with the increased deluge of data -- much of which is
sensitive or confidential -- the importance of cybersecurity continues to grow.
• The growing volume and sophistication of cyber attackers and attack techniques
compound the problem even further.
4. ELEMENTS OF CYBER SECURITY
• The cybersecurity field can be broken down into several different sections, the
coordination of which within the organization is crucial to the success of a
cybersecurity program. These sections include the following:
• Application security
• Information or data security
• Network security
• Disaster recovery/business continuity planning
• Operational security
• Cloud security
• Critical infrastructure security
• Physical security
• End-user education
5. BENEFITS OF CYBER SECURITY
• Business protection against cyberattacks and data breaches.
• Protection for data and networks.
• Prevention of unauthorized user access.
• Improved recovery time after a breach.
• Protection for end users and endpoint devices.
• Regulatory compliance.
• Business continuity.
• Improved confidence in the company's reputation and trust for developers,
partners, customers, stakeholders and employees.
7. TOP CYBER SECURITY CHALLENGES
• Cybersecurity is continually challenged by hackers, data loss, privacy, risk
management and changing cybersecurity strategies.
• The number of cyberattacks is not expected to decrease in the near future.
i. Evolving Threats
ii. Data Deluge
iii. Cyber security awareness training
iv. Work Force shortage and skills gap
v. Supply chain attacks and third party risk
8. HOW IS AUTOMATION USED IN CYBER
SECURITY
• Automation has become an integral component to keep companies protected
from the growing number and sophistication of cyberthreats.
• Using artificial intelligence (AI) and machine learning in areas with high-volume
data streams can help improve cybersecurity in three main categories:
a) Threat detection
b) Threat response
c) Human augmentation
9. CYBER SECURITY TOOLS
• Identity and access management (IAM)
• Firewalls
• Endpoint protection
• Antimalware/antivirus
• Intrusion prevention/detection systems (IPS/IDS)
• Data loss prevention (DLP)
• Endpoint detection and response
• Security information and event management (SIEM)
• Encryption tools
• Vulnerability scanners
• Virtual private networks (VPNs)
• Cloud workload protection platform (CWPP)
• Cloud access security broker (CASB)