Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

iCyber-Security on Reviewing Your Risks and your action plan

36 views

Published on

Cyber Themes 2018: https://londondsc.co.uk/cyberthemes2018/

Use "#ReviewingYourRisks" on Twitter to join in the conversation!

---
About iCyber-Security:
iCyber-Security is a leading-edge developer of cyber defence systems. Based in the UK we assist and support global organisations with the creation and on-going management of state of the art, client specific cyber security solutions designed to offer complete on-line protection from the growing threat of cyber attacks.

---
We are a not for profit organisation, founded as a joint venture by the Mayor of London, the Metropolitan Police Service (MPS) and the City of London Police (CoLP). We work in partnership with private industry and academia to help businesses, primarily SME business (less than 249 employees), to embrace digital innovations and operate in a secure online environment protecting themselves against cyber criminals.

What is our purpose?
- To provide simple, measurable and effective digital security solutions to businesses.
- To enable businesses to operate in a secure digital environment.
- To target victims of cyber crime and provide support to prevent repeat victimisation.
- To evidence a positive shift in the digital security of businesses.

---
Find out more information via:

Website ▶ https://londondsc.co.uk/
Twitter ▶ https://twitter.com/LondonDSC
LinkedIn ▶ https://www.linkedin.com/company/london-digital-security-centre/
Instagram ▶ https://www.instagram.com/londondigititalsecuritycentre

  • Be the first to comment

  • Be the first to like this

iCyber-Security on Reviewing Your Risks and your action plan

  1. 1. Marco Essomba How To Stop You Going Bust Using Cyber Security 1
  2. 2. Summary 2 1. Can You Go Bust Because Of A Cyber Attack 2. Who Is Doing The Hacking? 3. Digital Transformation Without An Infrastructure? 4. There Is Nowhere To Hide 5. Fighting Back: Well Known Cyber Defence Architecture 6. Weaknesses In Current Defence Systems 7. Security As Part Of Your Infrastructure DNA 8. Complete & Holistic Approach To Security 9. What Can You Do & Practical Steps?
  3. 3. Background ● Computer Networks Degree (London, UK) ● 10 years+ combined experience as Engineer/Consultant/Architect ● Extensive experience protecting banks/fintech, insurance, retail ● Application Delivery Networks: Fast / Secure / Available ● Founder & CTO of iCyber-Security Group (U.K.) Trusted by some of the world’s largest companies: 3
  4. 4. Hands On Cyber Security Over 200 cyber security projects completed by team in 24 months 4
  5. 5. 5 According to a report from Atlanta NBC affiliate WXIA, a city employee sent the station a screen shot of a ransomware message demanding a payment of $6,800 to unlock each computer or $51,000 to provide all the keys for affected systems. Can You Go Bust Because Of A Cyber Attack
  6. 6. 6 Can You Go Bust Because Of A Cyber Attack
  7. 7. 7 Can You Go Bust Because Of A Cyber Attack
  8. 8. 8 Can You Go Bust Because Of A Cyber Attack
  9. 9. 9 Can You Go Bust Because Of A Cyber Attack
  10. 10. 10 “Yahoo’s acquisition by Verizon saw a $350M reduction in purchase price due to a loss of 1.5 billion records.” Ponemon Institute Estimated cost of global hacking attacks this year = £4 Billion Can You Go Bust Because Of A Cyber Attack
  11. 11. 11 “And GDPR has been ‘done to death’ with the headlines warning about potential fines of up to €20 million or 4 per cent of a company’s global revenue... However, the true cost of a data breach is much greater, and is something that is neither widely discussed or documented.” CSO Online Estimated cost of global hacking attacks this year = £4 Billion Can You Go Bust Because Of A Cyber Attack
  12. 12. CyberCriminals Industrial Espionage Nation States Script Kiddies Hacktivists Who Is Doing The Hacking? 12 Insiders Organised Crime Cyber Weapons Testing
  13. 13. It’s Relentless 13
  14. 14. "DT may refer to the concept of "going paperless", and reaching a "digital business maturity" Change associated with the application of digital technology in all aspects of human society. DT affects both individual businesses & whole segments of society, such as govt, mass communications, art, medicine, and science. Digital Transformation? 14 Application Delivery Network Infrastructure: FAST, SECURE & highly AVAILABLE!
  15. 15. I have nothing valuable to protect I won’t happen to us Doing nothing is no longer the right response We do not have the budget We do not have the skills There Is Nowhere To Hide 15
  16. 16. DDOS FW RA ADC APP DBSVC Cloudflare Arbour Cloud Physical PT CheckPoint Palo Alto Juniper Symantec Imperva jetNEXUS A10 Security Monitoring and Event Management Cisco ACI F5 Internet Fighting Back: Known Cyber Defence Architecture 16
  17. 17. Weaknesses In Current Defence Systems 17 • Excellent albeit stand alone products • Limited if any connectivity • Managed by separate dashboards • Isolated breach / attack reporting • Reactive functionality • Inability to learn from attacks • Resource heavy management • Incomplete defence system
  18. 18. Security As Part Of Your Infrastructure DNA iCyber - Shield 18 • Integrated defence platform • Vendor agnostic capability • Legacy system support • Single management dashboard • API based architecture – future proof • Cognitive automation (AI) – self-learning • Rapid deployment • Monitor, detect, Act, Automate
  19. 19. Complete & Holistic Approach To Security iCyber-Shield 19
  20. 20. Even with low budget you can be secure Use 2-Factor Authentication everywhere you can Your data is valuable, think big, start small Have a least a local AV on your systems Educate your staff with basic principles of security What Can You Do & Practical Steps? 20 Education, Awareness, Education, Awareness
  21. 21. Questions & Answers 21 Marco Essomba @MarcoEssomba

×