SlideShare a Scribd company logo
1 of 13
Download to read offline
Cyber Resilience
Threat landscape in 2015
430,000,000
160,000
Anthem
Office of Personnel Management
Ashley Madison ,
The Hacking Team
Talk Talk(157k)
2015 - More data breaches !
$325m ransomware
170,000,000
£60m
101,000
Mossack Fonseca
100m Tech Support
100,000
500,000,000 identities
“The starting point must be that every British
company is a target, that every British network
will be attacked, and that cybercrime is not
something that happens to other people”.
George Osborne - 2015
Why the Third Sector is targeted
• They hold something criminals want
– Money
– Personal data
– Infrastructure
– Email accounts
– Intellectual property
– Credit card details
– Reputation
– A route to a bigger prize
• It’s easier
– Lack of understanding – “It won’t happen to me” – “I don’t have anything worth taking….”
– Not a priority - too busy running the organisation
– Lack of skills
– Limited budgets
• Just an internet (IP) address to the attacker…
Women’s Resource Centre website – Jan 2016
Ransomware = ‘Big business’
Government is Taking Steps…
• Invested £1.9 billion in National Cyber Security Programme
• Established National Cyber Security Centre
– Cyber Essentials Scheme
– Cyber Streetwise
– Cyber Information Sharing Partnership
• Academic Centres of Excellence in cyber security research (13)
• Develop cyber skills
• National Offensive Cyber Programme
• Increase cyber defences
But organisations needs to do more…
Benefits of Cyber Essentials
• Reduces the threat of 80% of cyber attacks.
• Cost effective and easy to implement.
• Mandated or strongly recommended for many contracts.
• Mitigate indirect supply chain risks
• Government backed scheme with wide industry support
• “Kite mark” demonstrates verified cyber credentials
• A set of 5 key technical controls
“It’s a no-brainer – and I’d like to see all businesses adopt it”
Ed Vaizey
5 Key Controls
• Firewalls
• Secure configuration
• User access control
• Malware protection
• Patch management
Supporting Organisations
• Cabinet Office
• Department of Culture, Media & Sport
• Information Commissioners Office
• Confederation of British Industry
• Federation of Small Businesses
• Chamber of Commerce
• British Insurance Brokers Association
Cyber Security Maturity
Make your organisation Cyber Resilient
• Understand the risk – Information!!!
• Implement appropriate technical controls
• Governance - policies, procedures
• Educate staff
• Incident and recovery planning
• Manage supply chain risks.
• Report Cyber Crime to PSNI
• Join CISP
Prevention
Secure Configurations
Sound Governance
Robust Policies
User Awareness
Technical controls
Detection
Monitoring and Alerting
Staff alertness
Anomalous Behaviour
Audit and Reviews
Security Tests
Response
Assessment
Containment
Reporting
Forensics
Recovery
Review
Prevention
Detection
Response
Key Take Aways!
What does this mean for NI?
NORTHERN IRELAND
Further information
• Cyber Essentials:
– https://www.gov.uk/government/publications/cyber-essentials-scheme-overview
– http://www.cyberstreetwise.com/cyberessentials
– http://www.cesg.gov.uk/servicecatalogue/cyber-essentials/Pages/Scheme-Library.aspx
• ICO:
– https://ico.org.uk/media/for-organisations/documents/1575/it_security_practical_guide.pdf
• HMG 10 Steps to Cyber Security:
– https://www.gov.uk/government/publications/10-steps-to-cyber-security-advice-sheets
• Cyber Information Sharing Partnership (CISP)
– https://www.cert.gov.uk/cisp/
• PSNI Cybercrime
– http://www.psni.police.uk/
• Cyphra
– Conrad Simpson csimpson@cyphra.com

More Related Content

What's hot

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer Self
 
Idc security graphic
Idc security graphicIdc security graphic
Idc security graphictrenders
 
Gabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingGabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingBlack Cell Ltd.
 
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT ServicesCyber Watching
 
San Antonio Security Community
San Antonio Security CommunitySan Antonio Security Community
San Antonio Security CommunityDenim Group
 
Secure channels inc. basic rules for data protection compliance
Secure channels inc.  basic rules for data protection complianceSecure channels inc.  basic rules for data protection compliance
Secure channels inc. basic rules for data protection complianceSecure Channels Inc.
 
Minimizing cyber security risks – Digital Security School DSS380
Minimizing cyber security risks – Digital Security School DSS380Minimizing cyber security risks – Digital Security School DSS380
Minimizing cyber security risks – Digital Security School DSS380Internews Ukraine
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of ThingsIsmail Al Kamal
 
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - AlgiersSmart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - AlgiersSmart Algiers
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityBen Boyd
 

What's hot (20)

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
INBA National Law Day- Nov. 26 '2015
INBA National Law Day- Nov. 26 '2015INBA National Law Day- Nov. 26 '2015
INBA National Law Day- Nov. 26 '2015
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer
 
Idc security graphic
Idc security graphicIdc security graphic
Idc security graphic
 
Gabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingGabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information Sharing
 
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
 
San Antonio Security Community
San Antonio Security CommunitySan Antonio Security Community
San Antonio Security Community
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Secure channels inc. basic rules for data protection compliance
Secure channels inc.  basic rules for data protection complianceSecure channels inc.  basic rules for data protection compliance
Secure channels inc. basic rules for data protection compliance
 
Minimizing cyber security risks – Digital Security School DSS380
Minimizing cyber security risks – Digital Security School DSS380Minimizing cyber security risks – Digital Security School DSS380
Minimizing cyber security risks – Digital Security School DSS380
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - AlgiersSmart Cities: Secure & Ethical by Design  - Smart Cities Summit 2018 - Algiers
Smart Cities: Secure & Ethical by Design - Smart Cities Summit 2018 - Algiers
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information Security
 

Viewers also liked

Fundraising Regulations - Scotland
Fundraising Regulations - ScotlandFundraising Regulations - Scotland
Fundraising Regulations - ScotlandNICVA
 
Cooperative Alternatives NICVA fundraising mix presentation
Cooperative Alternatives NICVA fundraising mix presentationCooperative Alternatives NICVA fundraising mix presentation
Cooperative Alternatives NICVA fundraising mix presentationNICVA
 
Final november members day 2012
Final november members day 2012Final november members day 2012
Final november members day 2012NICVA
 
Karamjit Singh NI Social Fund Commissioner Presentation
Karamjit Singh NI Social Fund Commissioner PresentationKaramjit Singh NI Social Fund Commissioner Presentation
Karamjit Singh NI Social Fund Commissioner PresentationNICVA
 
SOSVI Presentation to iof november 2012
SOSVI Presentation to iof november 2012SOSVI Presentation to iof november 2012
SOSVI Presentation to iof november 2012NICVA
 
Forging a New Path? Welfare Reform in Scotland
Forging a New Path? Welfare Reform in ScotlandForging a New Path? Welfare Reform in Scotland
Forging a New Path? Welfare Reform in ScotlandNICVA
 
Developing Your Fundraising Mix Presentation
Developing Your Fundraising Mix PresentationDeveloping Your Fundraising Mix Presentation
Developing Your Fundraising Mix PresentationNICVA
 
Fundraising regulator: A New System of Self-Regulation
Fundraising regulator: A New System of Self-RegulationFundraising regulator: A New System of Self-Regulation
Fundraising regulator: A New System of Self-RegulationNICVA
 
Independent examination and the role of an independent examiner
Independent examination and the role of an independent examinerIndependent examination and the role of an independent examiner
Independent examination and the role of an independent examinerNICVA
 
Working together for sustainability
Working together for sustainabilityWorking together for sustainability
Working together for sustainabilityNICVA
 
Charity Reporting Regulations
Charity Reporting RegulationsCharity Reporting Regulations
Charity Reporting RegulationsNICVA
 
Charity Reserves: the good, the bad and the ugly
Charity Reserves: the good, the bad and the uglyCharity Reserves: the good, the bad and the ugly
Charity Reserves: the good, the bad and the uglyNICVA
 
New charity accounting and reporting regulations
New charity accounting and reporting regulationsNew charity accounting and reporting regulations
New charity accounting and reporting regulationsNICVA
 
Welfare Reforms: The Reality in England
Welfare Reforms: The Reality in EnglandWelfare Reforms: The Reality in England
Welfare Reforms: The Reality in EnglandNICVA
 
How the NI Assembly works & How to Lobby
How the NI Assembly works & How to LobbyHow the NI Assembly works & How to Lobby
How the NI Assembly works & How to LobbyNICVA
 
Hurt lobbying presentation
Hurt lobbying presentationHurt lobbying presentation
Hurt lobbying presentationNICVA
 
Inspiring impact masterclass 27 1 15
Inspiring impact masterclass 27 1 15Inspiring impact masterclass 27 1 15
Inspiring impact masterclass 27 1 15NICVA
 
Raising money, the rules explained
Raising money, the rules explainedRaising money, the rules explained
Raising money, the rules explainedNICVA
 
NOW Project Social Enterprise Presentation
NOW Project Social Enterprise PresentationNOW Project Social Enterprise Presentation
NOW Project Social Enterprise PresentationNICVA
 
Winning Contracts and Tenders Presentation
Winning Contracts and Tenders PresentationWinning Contracts and Tenders Presentation
Winning Contracts and Tenders PresentationNICVA
 

Viewers also liked (20)

Fundraising Regulations - Scotland
Fundraising Regulations - ScotlandFundraising Regulations - Scotland
Fundraising Regulations - Scotland
 
Cooperative Alternatives NICVA fundraising mix presentation
Cooperative Alternatives NICVA fundraising mix presentationCooperative Alternatives NICVA fundraising mix presentation
Cooperative Alternatives NICVA fundraising mix presentation
 
Final november members day 2012
Final november members day 2012Final november members day 2012
Final november members day 2012
 
Karamjit Singh NI Social Fund Commissioner Presentation
Karamjit Singh NI Social Fund Commissioner PresentationKaramjit Singh NI Social Fund Commissioner Presentation
Karamjit Singh NI Social Fund Commissioner Presentation
 
SOSVI Presentation to iof november 2012
SOSVI Presentation to iof november 2012SOSVI Presentation to iof november 2012
SOSVI Presentation to iof november 2012
 
Forging a New Path? Welfare Reform in Scotland
Forging a New Path? Welfare Reform in ScotlandForging a New Path? Welfare Reform in Scotland
Forging a New Path? Welfare Reform in Scotland
 
Developing Your Fundraising Mix Presentation
Developing Your Fundraising Mix PresentationDeveloping Your Fundraising Mix Presentation
Developing Your Fundraising Mix Presentation
 
Fundraising regulator: A New System of Self-Regulation
Fundraising regulator: A New System of Self-RegulationFundraising regulator: A New System of Self-Regulation
Fundraising regulator: A New System of Self-Regulation
 
Independent examination and the role of an independent examiner
Independent examination and the role of an independent examinerIndependent examination and the role of an independent examiner
Independent examination and the role of an independent examiner
 
Working together for sustainability
Working together for sustainabilityWorking together for sustainability
Working together for sustainability
 
Charity Reporting Regulations
Charity Reporting RegulationsCharity Reporting Regulations
Charity Reporting Regulations
 
Charity Reserves: the good, the bad and the ugly
Charity Reserves: the good, the bad and the uglyCharity Reserves: the good, the bad and the ugly
Charity Reserves: the good, the bad and the ugly
 
New charity accounting and reporting regulations
New charity accounting and reporting regulationsNew charity accounting and reporting regulations
New charity accounting and reporting regulations
 
Welfare Reforms: The Reality in England
Welfare Reforms: The Reality in EnglandWelfare Reforms: The Reality in England
Welfare Reforms: The Reality in England
 
How the NI Assembly works & How to Lobby
How the NI Assembly works & How to LobbyHow the NI Assembly works & How to Lobby
How the NI Assembly works & How to Lobby
 
Hurt lobbying presentation
Hurt lobbying presentationHurt lobbying presentation
Hurt lobbying presentation
 
Inspiring impact masterclass 27 1 15
Inspiring impact masterclass 27 1 15Inspiring impact masterclass 27 1 15
Inspiring impact masterclass 27 1 15
 
Raising money, the rules explained
Raising money, the rules explainedRaising money, the rules explained
Raising money, the rules explained
 
NOW Project Social Enterprise Presentation
NOW Project Social Enterprise PresentationNOW Project Social Enterprise Presentation
NOW Project Social Enterprise Presentation
 
Winning Contracts and Tenders Presentation
Winning Contracts and Tenders PresentationWinning Contracts and Tenders Presentation
Winning Contracts and Tenders Presentation
 

Similar to Cyphra - Cyber Security

Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxMalikMumtaz6
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfBalaMurali958529
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumDavid Crozier
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cade Zvavanjanja
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"ChristiAKannapel
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Kevin Duffey
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015Dale Butler
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Will Your Business Get Hacked - Peterborough (Apr 28)
Will Your Business Get Hacked - Peterborough (Apr 28)Will Your Business Get Hacked - Peterborough (Apr 28)
Will Your Business Get Hacked - Peterborough (Apr 28)Kamarin Computers Ltd
 

Similar to Cyphra - Cyber Security (20)

Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Will Your Business Get Hacked - Peterborough (Apr 28)
Will Your Business Get Hacked - Peterborough (Apr 28)Will Your Business Get Hacked - Peterborough (Apr 28)
Will Your Business Get Hacked - Peterborough (Apr 28)
 

More from NICVA

Celebrating Voluntary Action in Northern Ireland
Celebrating Voluntary Action in Northern IrelandCelebrating Voluntary Action in Northern Ireland
Celebrating Voluntary Action in Northern IrelandNICVA
 
Trusthouse Charitable Foundation GrantNet workshop presentation
Trusthouse Charitable Foundation GrantNet workshop presentationTrusthouse Charitable Foundation GrantNet workshop presentation
Trusthouse Charitable Foundation GrantNet workshop presentationNICVA
 
Halifax Foundation for NI GrantNet workshop presentation
Halifax Foundation for NI GrantNet workshop presentationHalifax Foundation for NI GrantNet workshop presentation
Halifax Foundation for NI GrantNet workshop presentationNICVA
 
GDPR Readiness
GDPR ReadinessGDPR Readiness
GDPR ReadinessNICVA
 
Preparing for GDPR
Preparing for GDPR Preparing for GDPR
Preparing for GDPR NICVA
 
GDPR: The Countdown is on...
GDPR: The Countdown is on...GDPR: The Countdown is on...
GDPR: The Countdown is on...NICVA
 
Understanding accruals accounts
Understanding accruals accountsUnderstanding accruals accounts
Understanding accruals accountsNICVA
 
The Independent Examination of Receipts & Payments Accounts
The Independent Examination of Receipts & Payments AccountsThe Independent Examination of Receipts & Payments Accounts
The Independent Examination of Receipts & Payments AccountsNICVA
 
Financial governance and the role of the board
Financial governance and the role of the boardFinancial governance and the role of the board
Financial governance and the role of the boardNICVA
 
Diversifying your income
Diversifying your incomeDiversifying your income
Diversifying your incomeNICVA
 
Internal financial controls, a trustee's perspective
Internal financial controls, a trustee's perspectiveInternal financial controls, a trustee's perspective
Internal financial controls, a trustee's perspectiveNICVA
 
Common issues in financial management
Common issues in financial managementCommon issues in financial management
Common issues in financial managementNICVA
 
Social enterprise: What is it and what to consider
Social enterprise: What is it and what to considerSocial enterprise: What is it and what to consider
Social enterprise: What is it and what to considerNICVA
 
Fundraising in your local community
Fundraising in your local communityFundraising in your local community
Fundraising in your local communityNICVA
 
Social Finance: What is it, and where does it fit in?
Social Finance: What is it, and where does it fit in?Social Finance: What is it, and where does it fit in?
Social Finance: What is it, and where does it fit in?NICVA
 

More from NICVA (15)

Celebrating Voluntary Action in Northern Ireland
Celebrating Voluntary Action in Northern IrelandCelebrating Voluntary Action in Northern Ireland
Celebrating Voluntary Action in Northern Ireland
 
Trusthouse Charitable Foundation GrantNet workshop presentation
Trusthouse Charitable Foundation GrantNet workshop presentationTrusthouse Charitable Foundation GrantNet workshop presentation
Trusthouse Charitable Foundation GrantNet workshop presentation
 
Halifax Foundation for NI GrantNet workshop presentation
Halifax Foundation for NI GrantNet workshop presentationHalifax Foundation for NI GrantNet workshop presentation
Halifax Foundation for NI GrantNet workshop presentation
 
GDPR Readiness
GDPR ReadinessGDPR Readiness
GDPR Readiness
 
Preparing for GDPR
Preparing for GDPR Preparing for GDPR
Preparing for GDPR
 
GDPR: The Countdown is on...
GDPR: The Countdown is on...GDPR: The Countdown is on...
GDPR: The Countdown is on...
 
Understanding accruals accounts
Understanding accruals accountsUnderstanding accruals accounts
Understanding accruals accounts
 
The Independent Examination of Receipts & Payments Accounts
The Independent Examination of Receipts & Payments AccountsThe Independent Examination of Receipts & Payments Accounts
The Independent Examination of Receipts & Payments Accounts
 
Financial governance and the role of the board
Financial governance and the role of the boardFinancial governance and the role of the board
Financial governance and the role of the board
 
Diversifying your income
Diversifying your incomeDiversifying your income
Diversifying your income
 
Internal financial controls, a trustee's perspective
Internal financial controls, a trustee's perspectiveInternal financial controls, a trustee's perspective
Internal financial controls, a trustee's perspective
 
Common issues in financial management
Common issues in financial managementCommon issues in financial management
Common issues in financial management
 
Social enterprise: What is it and what to consider
Social enterprise: What is it and what to considerSocial enterprise: What is it and what to consider
Social enterprise: What is it and what to consider
 
Fundraising in your local community
Fundraising in your local communityFundraising in your local community
Fundraising in your local community
 
Social Finance: What is it, and where does it fit in?
Social Finance: What is it, and where does it fit in?Social Finance: What is it, and where does it fit in?
Social Finance: What is it, and where does it fit in?
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Cyphra - Cyber Security

  • 2. Threat landscape in 2015 430,000,000 160,000 Anthem Office of Personnel Management Ashley Madison , The Hacking Team Talk Talk(157k) 2015 - More data breaches ! $325m ransomware 170,000,000 £60m 101,000 Mossack Fonseca 100m Tech Support 100,000 500,000,000 identities
  • 3. “The starting point must be that every British company is a target, that every British network will be attacked, and that cybercrime is not something that happens to other people”. George Osborne - 2015
  • 4. Why the Third Sector is targeted • They hold something criminals want – Money – Personal data – Infrastructure – Email accounts – Intellectual property – Credit card details – Reputation – A route to a bigger prize • It’s easier – Lack of understanding – “It won’t happen to me” – “I don’t have anything worth taking….” – Not a priority - too busy running the organisation – Lack of skills – Limited budgets • Just an internet (IP) address to the attacker…
  • 5. Women’s Resource Centre website – Jan 2016
  • 6. Ransomware = ‘Big business’
  • 7. Government is Taking Steps… • Invested £1.9 billion in National Cyber Security Programme • Established National Cyber Security Centre – Cyber Essentials Scheme – Cyber Streetwise – Cyber Information Sharing Partnership • Academic Centres of Excellence in cyber security research (13) • Develop cyber skills • National Offensive Cyber Programme • Increase cyber defences But organisations needs to do more…
  • 8. Benefits of Cyber Essentials • Reduces the threat of 80% of cyber attacks. • Cost effective and easy to implement. • Mandated or strongly recommended for many contracts. • Mitigate indirect supply chain risks • Government backed scheme with wide industry support • “Kite mark” demonstrates verified cyber credentials • A set of 5 key technical controls “It’s a no-brainer – and I’d like to see all businesses adopt it” Ed Vaizey 5 Key Controls • Firewalls • Secure configuration • User access control • Malware protection • Patch management Supporting Organisations • Cabinet Office • Department of Culture, Media & Sport • Information Commissioners Office • Confederation of British Industry • Federation of Small Businesses • Chamber of Commerce • British Insurance Brokers Association
  • 10. Make your organisation Cyber Resilient • Understand the risk – Information!!! • Implement appropriate technical controls • Governance - policies, procedures • Educate staff • Incident and recovery planning • Manage supply chain risks. • Report Cyber Crime to PSNI • Join CISP Prevention Secure Configurations Sound Governance Robust Policies User Awareness Technical controls Detection Monitoring and Alerting Staff alertness Anomalous Behaviour Audit and Reviews Security Tests Response Assessment Containment Reporting Forensics Recovery Review
  • 12. What does this mean for NI? NORTHERN IRELAND
  • 13. Further information • Cyber Essentials: – https://www.gov.uk/government/publications/cyber-essentials-scheme-overview – http://www.cyberstreetwise.com/cyberessentials – http://www.cesg.gov.uk/servicecatalogue/cyber-essentials/Pages/Scheme-Library.aspx • ICO: – https://ico.org.uk/media/for-organisations/documents/1575/it_security_practical_guide.pdf • HMG 10 Steps to Cyber Security: – https://www.gov.uk/government/publications/10-steps-to-cyber-security-advice-sheets • Cyber Information Sharing Partnership (CISP) – https://www.cert.gov.uk/cisp/ • PSNI Cybercrime – http://www.psni.police.uk/ • Cyphra – Conrad Simpson csimpson@cyphra.com