SlideShare a Scribd company logo
1 of 28
www.cytegic.com
Company Confidential
This presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose
other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this
presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter
the information without prior notice.
Cytegic Cyber Security
Management Solution
15-12-02
| Proprietary & Confidential
Agenda
2
1. Introduction
2. Your Needs
3. Cytegic Solution
4. Next Steps
| Proprietary & Confidential
Why Cybersecurity Management Solutions?
3
“JPMorgan Chase will have spent more than $250 million annually on
cybersecurity by the end of 2014, with approximately 1,000 people
focused on the initiative. This effort will continue to grow
exponentially over the years" Jamie Dimon
76% of respondents said they are more
concerned about cybersecurity threats this
year than in the previous 12 months, up from
59% the year before. -PWC
87% of US chief executives said they were worried that cyber
threats could impact growth prospects, up from 69% the year
before.- PWC
Cybersecurity management requires day-to-day operational
commitment to transform from reactive to pro-active!
| Proprietary & Confidential
Business Focus
4
Cytegic is a must have - the flood of threat
intelligence and defensive information can no longer
be analysed manually
Cytegic provides multiple facets of an end-to-end -
cyber risk and security management solution
Common language for cyber risk and security
professionals – both operationally and strategically
 Monitor threats and maturity of defences
 Measure adherence to compliance standards both
internal and external on a day to day basis
 Manage and fully optimize cybersecurity posture
| Proprietary & Confidential
Cytegic Integrated Solution
5
Dynamic Trend
Analysis
Cyber Maturity
Assessment
Cyber Decision
Support System
www.cytegic.com
Cyber Risk Management Facet
6
Evaluate Exposure
Determine Risk Appetite
| Proprietary & Confidential
Risk – Executive Screen
Enterprise
Risk
Environment
Risks
Quantified
Impact
Historical
Risk
Business Asset
Risk Trend
Risk Score Actual
Risk Threshold
Impact Amount $
| Proprietary & Confidential
Risk – CRO Screen
• Build own thresholds
• Good practice risk
sources
Confidentiality Integrity Availability
www.cytegic.com
Cyber Security Management Facet
9
Explore the Organization
| Proprietary & Confidential
CISO Screen – Enterprise View
10
Enterprise Risk Index Enterprise Assets at Risk
Threats to the Enterprise Defensive Controls Importance
Environments Risk Index
| Proprietary & Confidential
CISO Screen – Environment Controls
11
| Proprietary & Confidential
Controls – Prioritized for Improvement
12
The Control Gauge
Color Bar =
Relative Importance
Grey Bar =
Maturity Score %
Infrastructure Controls
Preventative Controls
Detective Controls
| Proprietary & Confidential
CyMA Environment Control Maturities
13
Control Maturities
• Environment View
• Drill down to Criteria
• Input to Threat
Analysis in CDSS
• Contextual
• Simulations
| Proprietary & Confidential
CyMA Control Maturities
14
Detailed Control Analysis
• Automated collection of
control configuration facts
• Drill down to criteria
• Sort and Rank
• Eliminate from analysis if
not implemented
www.cytegic.com
Threat Intelligence Facet
15
Geo-Political Specificity
Industry Sector Specificity
| Proprietary & Confidential 16
Remote Terminal
Server
CISO Screen - Threats
What Threat Agents are
we facing?
What Attack Methods are
we susceptible to?
System
s
Softwar
e
Faciliti
es
| Proprietary & Confidential
Trends in the Threats Landscape
17
The Threat Agents
The Attack Methods
| Proprietary & Confidential
DyTA Relevant Threat Levels
18
Threat Agents
Relevant Attack
Methods
| Proprietary & Confidential
DyTA Threat Charts
Attackers Activity over time
with filters for:
• Use of Attack Methods
• Targeted Assets
• Geo Region Targets
• Industry Segment Activity
www.cytegic.com
Environments & Business Assets Facet
20
How will these threats and security
posture affect my organization?
| Proprietary & Confidential
CDSS - Business Risk
21
| Proprietary & Confidential
Overall Risk Scores
22
Environment Threat Level Asset Threat Level
 Increased Attacker Activity will increase over all Threat Levels
 Increased Control Maturities will decrease over all Threat Levels
| Proprietary & Confidential
CDSS User Interface – Analysis & Simulations
23
25.00 - Low 25.00 - Low
| Proprietary & Confidential
Risk – CRO Screen – Mission Accomplished
Enterprise
Risk
Environment
Risks
Quantified
Impact
Historical
Risk
Business Asset
Risk Trend
Risk Score Actual
Risk Threshold
Impact Amount $
| Proprietary & Confidential
Cytegic an End-to-End Solution
A must have for ensuring the
safety of your business assets
Operational and Actionable
Exposure and Compliance
Strategic Risk Appetite
CRO CISO C-Suite
| Proprietary & Confidential
Case Study – CDSS
26
The CISO of a large bank wished to perform cybersecurity assessments regarding the
impact of migrating the CRM to the Cloud.
Key requirements were:
• Independent assessment capability
• Quick implementation (a technical assessment of new technology was due)
• Ability to conduct dynamic assessments using up to date intelligence.
Results:
Decision to utilize
cloud technology
Improve buy- in with the
management; justify IT
security spending using
real data
Conduct frequent
assessments without
having to rely on extremal
auditors and / or additional
budget
Produced unbiased
results
| Proprietary & Confidential
Thank you
27
www.cytegic.cominfo@cytegic.com
US Office:
Suite #200
411 Hackensack Ave.
Hackensack, NJ 07601
USA
Israel Office:
Suite #601
39 Sha’ul HaMelech Blvd
Tel-Aviv, 64928
Israel
Contact Information
+1 (201) 893-8155 +972-52-522-1170

More Related Content

What's hot

Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Resolver Inc.
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID EraCitrin Cooperman
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Resolver Inc.
 
Beijaflore inc. white paper IT compliance program v1.0
Beijaflore inc. white paper   IT compliance program v1.0Beijaflore inc. white paper   IT compliance program v1.0
Beijaflore inc. white paper IT compliance program v1.0Maxime de Jabrun
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in ManufacturingWilliam McBorrough
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trendsDImension Data
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesOllie Whitehouse
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
Information Secuirty Vulnerability Management
Information Secuirty   Vulnerability ManagementInformation Secuirty   Vulnerability Management
Information Secuirty Vulnerability Managementtschraider
 
Security metrics
Security metrics Security metrics
Security metrics PRAYAGRAJ11
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiDaneWarren
 
Effective Security Metrics
Effective Security MetricsEffective Security Metrics
Effective Security MetricsInnoTech
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 

What's hot (20)

Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Beijaflore inc. white paper IT compliance program v1.0
Beijaflore inc. white paper   IT compliance program v1.0Beijaflore inc. white paper   IT compliance program v1.0
Beijaflore inc. white paper IT compliance program v1.0
 
Cyber-Risk-Management-Assessment (1)
Cyber-Risk-Management-Assessment (1)Cyber-Risk-Management-Assessment (1)
Cyber-Risk-Management-Assessment (1)
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
Catalyst research institute
Catalyst research instituteCatalyst research institute
Catalyst research institute
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory Services
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Information Secuirty Vulnerability Management
Information Secuirty   Vulnerability ManagementInformation Secuirty   Vulnerability Management
Information Secuirty Vulnerability Management
 
Security metrics
Security metrics Security metrics
Security metrics
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Adequate securitynew1404.019
Adequate securitynew1404.019Adequate securitynew1404.019
Adequate securitynew1404.019
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Effective Security Metrics
Effective Security MetricsEffective Security Metrics
Effective Security Metrics
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 

Viewers also liked

Calendari escola de families
Calendari escola de familiesCalendari escola de families
Calendari escola de familiesampaestel
 
Catálogo de Servicios de Click and Come en Español
Catálogo de Servicios de Click and Come en EspañolCatálogo de Servicios de Click and Come en Español
Catálogo de Servicios de Click and Come en EspañolClick & Come
 
SPEC Engineers & Consultants Pvt. Ltd, New Delhi, Engineers and Consultants S...
SPEC Engineers & Consultants Pvt. Ltd, New Delhi, Engineers and Consultants S...SPEC Engineers & Consultants Pvt. Ltd, New Delhi, Engineers and Consultants S...
SPEC Engineers & Consultants Pvt. Ltd, New Delhi, Engineers and Consultants S...IndiaMART InterMESH Limited
 
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQueryRemedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQueryTatsuhiko Miyagawa
 
Pane mänguasjad karpi!
Pane mänguasjad karpi!Pane mänguasjad karpi!
Pane mänguasjad karpi!MaiaLust
 
Circuitosintegrados IYY
Circuitosintegrados IYYCircuitosintegrados IYY
Circuitosintegrados IYYelectro1102
 
Catalogo shell club_smart_2015
Catalogo shell club_smart_2015Catalogo shell club_smart_2015
Catalogo shell club_smart_2015stryper1968
 
Social-Media-Guidelines im Unternehmen
Social-Media-Guidelines im UnternehmenSocial-Media-Guidelines im Unternehmen
Social-Media-Guidelines im UnternehmenGábor Molnár
 
SEOGuardian - Report posizionamento nei motori di ricerca - Vestiti da sposa
SEOGuardian - Report posizionamento nei motori di ricerca - Vestiti da sposaSEOGuardian - Report posizionamento nei motori di ricerca - Vestiti da sposa
SEOGuardian - Report posizionamento nei motori di ricerca - Vestiti da sposaBint
 
Etiqueta Y Protocolo
Etiqueta Y ProtocoloEtiqueta Y Protocolo
Etiqueta Y Protocolodiego189
 
Delegación Tlalpan y UVM firman convenio Académico
Delegación Tlalpan y UVM firman convenio AcadémicoDelegación Tlalpan y UVM firman convenio Académico
Delegación Tlalpan y UVM firman convenio AcadémicoUVM
 
Tambo Plaza, Lima Sur- Peru
Tambo Plaza, Lima Sur- PeruTambo Plaza, Lima Sur- Peru
Tambo Plaza, Lima Sur- PeruRuth Demetriou
 
Donald H Taylor, The Future Shape of L&D
Donald H Taylor, The Future Shape of L&DDonald H Taylor, The Future Shape of L&D
Donald H Taylor, The Future Shape of L&DLearning Pool Ltd
 
Alexandre Sagala Le marketing relationnel, des stratégies d'acquisition et de...
Alexandre Sagala Le marketing relationnel, des stratégies d'acquisition et de...Alexandre Sagala Le marketing relationnel, des stratégies d'acquisition et de...
Alexandre Sagala Le marketing relationnel, des stratégies d'acquisition et de...AQT-presentations
 

Viewers also liked (20)

Calendari escola de families
Calendari escola de familiesCalendari escola de families
Calendari escola de families
 
Catálogo de Servicios de Click and Come en Español
Catálogo de Servicios de Click and Come en EspañolCatálogo de Servicios de Click and Come en Español
Catálogo de Servicios de Click and Come en Español
 
Cesar augusto camel rojas
Cesar augusto camel rojasCesar augusto camel rojas
Cesar augusto camel rojas
 
SPEC Engineers & Consultants Pvt. Ltd, New Delhi, Engineers and Consultants S...
SPEC Engineers & Consultants Pvt. Ltd, New Delhi, Engineers and Consultants S...SPEC Engineers & Consultants Pvt. Ltd, New Delhi, Engineers and Consultants S...
SPEC Engineers & Consultants Pvt. Ltd, New Delhi, Engineers and Consultants S...
 
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQueryRemedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
Remedie: Building a desktop app with HTTP::Engine, SQLite and jQuery
 
Pane mänguasjad karpi!
Pane mänguasjad karpi!Pane mänguasjad karpi!
Pane mänguasjad karpi!
 
Taller Online de Netcat
Taller Online de NetcatTaller Online de Netcat
Taller Online de Netcat
 
Circuitosintegrados IYY
Circuitosintegrados IYYCircuitosintegrados IYY
Circuitosintegrados IYY
 
Catalogo shell club_smart_2015
Catalogo shell club_smart_2015Catalogo shell club_smart_2015
Catalogo shell club_smart_2015
 
Social-Media-Guidelines im Unternehmen
Social-Media-Guidelines im UnternehmenSocial-Media-Guidelines im Unternehmen
Social-Media-Guidelines im Unternehmen
 
Educación
Educación Educación
Educación
 
SEOGuardian - Report posizionamento nei motori di ricerca - Vestiti da sposa
SEOGuardian - Report posizionamento nei motori di ricerca - Vestiti da sposaSEOGuardian - Report posizionamento nei motori di ricerca - Vestiti da sposa
SEOGuardian - Report posizionamento nei motori di ricerca - Vestiti da sposa
 
Capacitación datos personales ITEI
Capacitación datos personales ITEICapacitación datos personales ITEI
Capacitación datos personales ITEI
 
Informatica Forense
Informatica ForenseInformatica Forense
Informatica Forense
 
Etiqueta Y Protocolo
Etiqueta Y ProtocoloEtiqueta Y Protocolo
Etiqueta Y Protocolo
 
Delegación Tlalpan y UVM firman convenio Académico
Delegación Tlalpan y UVM firman convenio AcadémicoDelegación Tlalpan y UVM firman convenio Académico
Delegación Tlalpan y UVM firman convenio Académico
 
Tambo Plaza, Lima Sur- Peru
Tambo Plaza, Lima Sur- PeruTambo Plaza, Lima Sur- Peru
Tambo Plaza, Lima Sur- Peru
 
Quijote 3ºc
Quijote 3ºcQuijote 3ºc
Quijote 3ºc
 
Donald H Taylor, The Future Shape of L&D
Donald H Taylor, The Future Shape of L&DDonald H Taylor, The Future Shape of L&D
Donald H Taylor, The Future Shape of L&D
 
Alexandre Sagala Le marketing relationnel, des stratégies d'acquisition et de...
Alexandre Sagala Le marketing relationnel, des stratégies d'acquisition et de...Alexandre Sagala Le marketing relationnel, des stratégies d'acquisition et de...
Alexandre Sagala Le marketing relationnel, des stratégies d'acquisition et de...
 

Similar to Cytegic presentation 02 12

Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey aheadKevin Duffey
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementNajmul Hussain
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk SureCloud
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfawish11
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programPriyanka Aash
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementJamesMooreCo
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleRishi Kant
 
Achieve Excellence through Customer Experience
Achieve Excellence through Customer ExperienceAchieve Excellence through Customer Experience
Achieve Excellence through Customer ExperienceNaveen Agarwal
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesSlideTeam
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
 

Similar to Cytegic presentation 02 12 (20)

Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Agile-Risk-Management in Project Management
Agile-Risk-Management in Project ManagementAgile-Risk-Management in Project Management
Agile-Risk-Management in Project Management
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
Risk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In NepalRisk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In Nepal
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk Management
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
 
Achieve Excellence through Customer Experience
Achieve Excellence through Customer ExperienceAchieve Excellence through Customer Experience
Achieve Excellence through Customer Experience
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation Slides
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Cytegic presentation 02 12

  • 1. www.cytegic.com Company Confidential This presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice. Cytegic Cyber Security Management Solution 15-12-02
  • 2. | Proprietary & Confidential Agenda 2 1. Introduction 2. Your Needs 3. Cytegic Solution 4. Next Steps
  • 3. | Proprietary & Confidential Why Cybersecurity Management Solutions? 3 “JPMorgan Chase will have spent more than $250 million annually on cybersecurity by the end of 2014, with approximately 1,000 people focused on the initiative. This effort will continue to grow exponentially over the years" Jamie Dimon 76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. -PWC 87% of US chief executives said they were worried that cyber threats could impact growth prospects, up from 69% the year before.- PWC Cybersecurity management requires day-to-day operational commitment to transform from reactive to pro-active!
  • 4. | Proprietary & Confidential Business Focus 4 Cytegic is a must have - the flood of threat intelligence and defensive information can no longer be analysed manually Cytegic provides multiple facets of an end-to-end - cyber risk and security management solution Common language for cyber risk and security professionals – both operationally and strategically  Monitor threats and maturity of defences  Measure adherence to compliance standards both internal and external on a day to day basis  Manage and fully optimize cybersecurity posture
  • 5. | Proprietary & Confidential Cytegic Integrated Solution 5 Dynamic Trend Analysis Cyber Maturity Assessment Cyber Decision Support System
  • 6. www.cytegic.com Cyber Risk Management Facet 6 Evaluate Exposure Determine Risk Appetite
  • 7. | Proprietary & Confidential Risk – Executive Screen Enterprise Risk Environment Risks Quantified Impact Historical Risk Business Asset Risk Trend Risk Score Actual Risk Threshold Impact Amount $
  • 8. | Proprietary & Confidential Risk – CRO Screen • Build own thresholds • Good practice risk sources Confidentiality Integrity Availability
  • 9. www.cytegic.com Cyber Security Management Facet 9 Explore the Organization
  • 10. | Proprietary & Confidential CISO Screen – Enterprise View 10 Enterprise Risk Index Enterprise Assets at Risk Threats to the Enterprise Defensive Controls Importance Environments Risk Index
  • 11. | Proprietary & Confidential CISO Screen – Environment Controls 11
  • 12. | Proprietary & Confidential Controls – Prioritized for Improvement 12 The Control Gauge Color Bar = Relative Importance Grey Bar = Maturity Score % Infrastructure Controls Preventative Controls Detective Controls
  • 13. | Proprietary & Confidential CyMA Environment Control Maturities 13 Control Maturities • Environment View • Drill down to Criteria • Input to Threat Analysis in CDSS • Contextual • Simulations
  • 14. | Proprietary & Confidential CyMA Control Maturities 14 Detailed Control Analysis • Automated collection of control configuration facts • Drill down to criteria • Sort and Rank • Eliminate from analysis if not implemented
  • 15. www.cytegic.com Threat Intelligence Facet 15 Geo-Political Specificity Industry Sector Specificity
  • 16. | Proprietary & Confidential 16 Remote Terminal Server CISO Screen - Threats What Threat Agents are we facing? What Attack Methods are we susceptible to? System s Softwar e Faciliti es
  • 17. | Proprietary & Confidential Trends in the Threats Landscape 17 The Threat Agents The Attack Methods
  • 18. | Proprietary & Confidential DyTA Relevant Threat Levels 18 Threat Agents Relevant Attack Methods
  • 19. | Proprietary & Confidential DyTA Threat Charts Attackers Activity over time with filters for: • Use of Attack Methods • Targeted Assets • Geo Region Targets • Industry Segment Activity
  • 20. www.cytegic.com Environments & Business Assets Facet 20 How will these threats and security posture affect my organization?
  • 21. | Proprietary & Confidential CDSS - Business Risk 21
  • 22. | Proprietary & Confidential Overall Risk Scores 22 Environment Threat Level Asset Threat Level  Increased Attacker Activity will increase over all Threat Levels  Increased Control Maturities will decrease over all Threat Levels
  • 23. | Proprietary & Confidential CDSS User Interface – Analysis & Simulations 23 25.00 - Low 25.00 - Low
  • 24. | Proprietary & Confidential Risk – CRO Screen – Mission Accomplished Enterprise Risk Environment Risks Quantified Impact Historical Risk Business Asset Risk Trend Risk Score Actual Risk Threshold Impact Amount $
  • 25. | Proprietary & Confidential Cytegic an End-to-End Solution A must have for ensuring the safety of your business assets Operational and Actionable Exposure and Compliance Strategic Risk Appetite CRO CISO C-Suite
  • 26. | Proprietary & Confidential Case Study – CDSS 26 The CISO of a large bank wished to perform cybersecurity assessments regarding the impact of migrating the CRM to the Cloud. Key requirements were: • Independent assessment capability • Quick implementation (a technical assessment of new technology was due) • Ability to conduct dynamic assessments using up to date intelligence. Results: Decision to utilize cloud technology Improve buy- in with the management; justify IT security spending using real data Conduct frequent assessments without having to rely on extremal auditors and / or additional budget Produced unbiased results
  • 27. | Proprietary & Confidential Thank you 27
  • 28. www.cytegic.cominfo@cytegic.com US Office: Suite #200 411 Hackensack Ave. Hackensack, NJ 07601 USA Israel Office: Suite #601 39 Sha’ul HaMelech Blvd Tel-Aviv, 64928 Israel Contact Information +1 (201) 893-8155 +972-52-522-1170

Editor's Notes

  1. This presentation contains a rough outline for speaker notes Please contribute as reflects the things you focus on – so that we can all benefit
  2. Modify this page as necessary for your meeting. Look at additional slides to construct other narratives. This narrative is focused on showing what the end state is (realizing our value prop) – assuming the viewer likes that And them showing them how you get to that end state
  3. A comprehensive cyber management solution. Cyber defense is very expensive – and managers are not seeing any reduction in losses Cyber threat awareness is growing substantially Growing fear of the threat of cyber impacts A workable solution is a day to day proposition
  4. A must have due sheer complexity Cytegic is an end to end – operational tool set Targeted at CISO, CRO and C-Suite Monitor Measure Manage
  5. An integrated solution – must have -
  6. Cycle begins with the CRO - what is our exposure - what can we tolerate
  7. CRO Screen – a concise focused screen showing for each Asset - the trend for trend of threats - the actual risk index indicating threat level - a risk index threshold – indicative of appetite - the value of the impact of asset compromise
  8. A detailed view of the level assets under pressure of compromising - Confidentiality of the asset - integrity in terms of accuracy, completeness and viability of the asset - a level of the availability of the asset in performing its proper business function The correspondence to business loss in terms of impact dollars
  9. Now that we have a high level view of the - Threat Level - our acceptable threshold - and the potential loss/exposure to the business We can learn more about the organizaion
  10. This is the View of the over-all operational landscape that A CISO needs to understand in order comply with the guidelines Set up by CRO an the C-Suite - overall risk index - Environment threat levels - Defensive controls – remediation importance - assets at risk - Threat Agents and Attack Methods
  11. If we Drill down to the Environment Screen we can View the relevant controls Lets look at these in detail
  12. There are three types of Control Groups - Infrastructure - Preventive - Detective Color bar shows relative importance – which of all the controls need to be remediated – ranked Grey BAR – maturity calculated in CyMA
  13. CyMA is the facet which collects facts about the controls from configuration files It constructs a portrait of all the controls deployed and their relative maturities Those maturities are used in the CDSS analytical engine
  14. A List and status of controls - YES/NO controls which are not present/relevant in the environment are removed so as not to skew scores - this is as opposed to controls which are required but not implemented Maturity - based on all the collected indicators of maturity from control configuration files which are collected automatically Completeness - a ration showing all the indicators avail relative to those answered – a proxy for confidence Drill Down - go to each indicator/criterion and examine how it is scored
  15. Now that we have a sense of our 1. Risk Appetite as seen by the CRO 2. had the CISO examine the overall Control posture for each of the environments in organization We can look at the threat profile the company faces 1. How are Attacker threats distributed over geo-pol and industry sectors 2. What attack methods are trending in those geo-pol and industry sectors
  16. Again at the environment level we can examine A prioritized – ranked list of Threat Agents and Attack methods
  17. The threats we face Attackers Attack methods Where does this data come from? [see next screen]
  18. DyTA is an Intelligence platform Gather OSINT for the WEB – hacker blogs, respected industry watchers, etc Additional Sources such as SixGill (Dark Net) and Isight available Data is scrubbed, semantically analyzed and keyed against a taxonomy of Cyber Terms This graph – shows relative activity levels of attackers based on several relevant filters Used in the CDSS analysis of Threats
  19. Same threat data shown as a scatter plot with - forecasted trending (going out 30 days) - pattern matching for key events such as pre-christmas spike patters Filter down to specific – geopol, industry, use of attack methods, assets of interest Weekly feeds for timely analysis and assessments
  20. CDSS churns all the threat data, geo-pol, industry sector, environment controls in place, control maturities And renders all this as 1. Enterprise and Environment Threat Levels 2. Controls requiring mediation As we started all this data goes in to showing the
  21. The Environment Threat level and the assets at risk give us a complete portrait of our business
  22. CDSS permits what if scenarios so that proposed courses of action can be understood Increased Attack Methods will increase over all Threat Levels Increased Control Maturities will decrease over all Threat Levels
  23. CRO Screen – We end where we started - all the analysis and data collection yields these exposure and threshold positions - Feed back from the simulation capabilities in CDSS permit us to test remediated configurations that now yield acceptable exposure profiles and risk appetite