SlideShare a Scribd company logo
1 of 24
Download to read offline
How to save your company
from having a security breach
Matej Zachar
Project & Security Manager
Ota Čermák
Business Development
Manager
SAFETICA TECHNOLOGIES
• ESET Technology Alliance Partner
• Czech company
• 60 employees
• Developing security software since 2009
• 30 000 protected devices in 50 countries
with over 300 customers
• Human error
• Abuse / fraud
• Problems in processes
ROOT CAUSES OF DATA LEAKAGE
• Chelsea and Westminster Hospital NHS Foundation
Trust has been fined £180,000 after revealing the
email addresses of more than 700 users of HIV
service. The incident happened when a member of
staff was sending newsletter and used field CC:
instead of BCC:
• (9.5.2016, ico.org.uk)
HUMAN ERROR
• 78 % of companies have already had a data leak
caused by an internal source
• 50 % of employees take sensitive data with them
when leaving a job
• 80 % of these plan to use this data in their new job
• (Ponemon Institute)
ABUSE / FRAUD
• Missing policies / guidelines
• E.g. data transfer
• Insufficient user awareness
• Lack of control mechanisms
PROCESSES
• June 2016: Massive data leak
• 1.2 million customer records
• Insider sold the data
• 133.000€ Fine
• Front page headlines
• They admitted incident
• (But played it down)
X
• Crisis communication
• Remediation
• Transparency
AUTOMOTIVE
ENGINEERING
• Every company.
WHO IS THE TARGET?
• Production companies and
manufacturing
• Private Health care
• Logistics
• Automotive
• Public sector
• Financial sector, insurance,
advisory
• Law firms
• Security forces, military
and suppliers
• Utilities
• Services
• Pharmacy
• Food and Beverages
WHO IS THE TARGET?
• Every company.
• Personal data - GDPR
• Know-how
• Financial data
• Employees
WHO IS THE TARGET?
• Get support from board
• Identify risks
• Classify the data
• Secure their perimeter
• Implement policies
• Provide training
HOW TO DO IT
• „Open“ companies
• Agile development
• „Closed“ firms
• Hybrid approach
• Startups, young companies
CHOOSE THE RIGHT APPROACH
• Access to data
• Secure transfer
• User behavior
• Insider threat
FIND AND SOLVE ISSUES
• Be open to your employees
• Implement policies
• Train users
• Be aware of new and leaving staff
• Discuss everything!
DEVELOP RESPONSIBILITY
• Data Loss Prevention
• Security audit
• Encryption
• Mobile security
IMPLEMENT TECHNOLOGY
• Based in Czech republic
• Creating products for physical security
• Management realizes
the importance of data
1. Policies
2. Training using DLP notifications
3. Step-by-step protection of know-how
4. Monitoring of leaving employees
Q & A
THANK YOU FOR YOUR TIME
ota.cermak@safetica.com
Matej Zachar
Project & Security Manager
Ota Čermák
Channel Sales Manager
matej.zachar@safetica.com

More Related Content

What's hot

CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraKapil Mehrotra
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)James Neo
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach AnalysisTal Be'ery
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingTriskele Labs
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research dataTomppa Järvinen
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 

What's hot (20)

CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Hacking3e ppt ch10
Hacking3e ppt ch10Hacking3e ppt ch10
Hacking3e ppt ch10
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness Training
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Funsec3e ppt ch05
Funsec3e ppt ch05Funsec3e ppt ch05
Funsec3e ppt ch05
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 

Viewers also liked

Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack PresentationCreditCardFinder
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threatsdnomura
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security BreachAlienVault
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?Edge Pereira
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 

Viewers also liked (8)

Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack Presentation
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 

Similar to How to safe your company from having a security breach

Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data EthicsErik Kokkonen
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Gabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingGabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingBlack Cell Ltd.
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation PlatformTaming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation PlatformNordic APIs
 
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...Perimeter Security: Why it's no longer enough, and where cybersecurity must a...
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...ZoneFox
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...Health IT Conference – iHT2
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterPeter Jones
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 

Similar to How to safe your company from having a security breach (20)

Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Gabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information SharingGabor Munk - CTI and Information Sharing
Gabor Munk - CTI and Information Sharing
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation PlatformTaming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
 
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...Perimeter Security: Why it's no longer enough, and where cybersecurity must a...
Perimeter Security: Why it's no longer enough, and where cybersecurity must a...
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
SIA Webinar: The OHS Professional and Cyber Security
SIA Webinar: The OHS Professional and Cyber SecuritySIA Webinar: The OHS Professional and Cyber Security
SIA Webinar: The OHS Professional and Cyber Security
 
Brokerage and market Platform
Brokerage and market PlatformBrokerage and market Platform
Brokerage and market Platform
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 

More from Baltimax

The Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacijaThe Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacijaBaltimax
 
Bendrasis duomenų apsaugos reglamentas
Bendrasis duomenų apsaugos reglamentasBendrasis duomenų apsaugos reglamentas
Bendrasis duomenų apsaugos reglamentasBaltimax
 
Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Integruotas IT valdymas ir apsauga su „Axence nVision 9“Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Integruotas IT valdymas ir apsauga su „Axence nVision 9“Baltimax
 
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentasKibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentasBaltimax
 
RingTime telefoninės sistemos
RingTime telefoninės sistemosRingTime telefoninės sistemos
RingTime telefoninės sistemosBaltimax
 
Svarbiausios ESET technologijos
Svarbiausios ESET technologijosSvarbiausios ESET technologijos
Svarbiausios ESET technologijosBaltimax
 
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimuRizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimuBaltimax
 
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...Baltimax
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Baltimax
 
Duomenų praradimo rizika ir atsarginių kopijų svarba
Duomenų praradimo rizika ir atsarginių kopijų svarbaDuomenų praradimo rizika ir atsarginių kopijų svarba
Duomenų praradimo rizika ir atsarginių kopijų svarbaBaltimax
 
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
"Baltimax" œ– progresīvi risinājumi Jūsu biznesamBaltimax
 
„Baltimax“ produktų katalogas
„Baltimax“ produktų katalogas„Baltimax“ produktų katalogas
„Baltimax“ produktų katalogasBaltimax
 

More from Baltimax (12)

The Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacijaThe Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
 
Bendrasis duomenų apsaugos reglamentas
Bendrasis duomenų apsaugos reglamentasBendrasis duomenų apsaugos reglamentas
Bendrasis duomenų apsaugos reglamentas
 
Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Integruotas IT valdymas ir apsauga su „Axence nVision 9“Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Integruotas IT valdymas ir apsauga su „Axence nVision 9“
 
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentasKibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
 
RingTime telefoninės sistemos
RingTime telefoninės sistemosRingTime telefoninės sistemos
RingTime telefoninės sistemos
 
Svarbiausios ESET technologijos
Svarbiausios ESET technologijosSvarbiausios ESET technologijos
Svarbiausios ESET technologijos
 
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimuRizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimu
 
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?
 
Duomenų praradimo rizika ir atsarginių kopijų svarba
Duomenų praradimo rizika ir atsarginių kopijų svarbaDuomenų praradimo rizika ir atsarginių kopijų svarba
Duomenų praradimo rizika ir atsarginių kopijų svarba
 
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
 
„Baltimax“ produktų katalogas
„Baltimax“ produktų katalogas„Baltimax“ produktų katalogas
„Baltimax“ produktų katalogas
 

Recently uploaded

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 

Recently uploaded (20)

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 

How to safe your company from having a security breach

  • 1. How to save your company from having a security breach Matej Zachar Project & Security Manager Ota Čermák Business Development Manager
  • 2. SAFETICA TECHNOLOGIES • ESET Technology Alliance Partner • Czech company • 60 employees • Developing security software since 2009 • 30 000 protected devices in 50 countries with over 300 customers
  • 3.
  • 4. • Human error • Abuse / fraud • Problems in processes ROOT CAUSES OF DATA LEAKAGE
  • 5. • Chelsea and Westminster Hospital NHS Foundation Trust has been fined £180,000 after revealing the email addresses of more than 700 users of HIV service. The incident happened when a member of staff was sending newsletter and used field CC: instead of BCC: • (9.5.2016, ico.org.uk) HUMAN ERROR
  • 6. • 78 % of companies have already had a data leak caused by an internal source • 50 % of employees take sensitive data with them when leaving a job • 80 % of these plan to use this data in their new job • (Ponemon Institute) ABUSE / FRAUD
  • 7. • Missing policies / guidelines • E.g. data transfer • Insufficient user awareness • Lack of control mechanisms PROCESSES
  • 8.
  • 9. • June 2016: Massive data leak • 1.2 million customer records • Insider sold the data • 133.000€ Fine • Front page headlines
  • 10. • They admitted incident • (But played it down) X • Crisis communication • Remediation • Transparency
  • 13. • Every company. WHO IS THE TARGET?
  • 14. • Production companies and manufacturing • Private Health care • Logistics • Automotive • Public sector • Financial sector, insurance, advisory • Law firms • Security forces, military and suppliers • Utilities • Services • Pharmacy • Food and Beverages WHO IS THE TARGET?
  • 15. • Every company. • Personal data - GDPR • Know-how • Financial data • Employees WHO IS THE TARGET?
  • 16. • Get support from board • Identify risks • Classify the data • Secure their perimeter • Implement policies • Provide training HOW TO DO IT
  • 17. • „Open“ companies • Agile development • „Closed“ firms • Hybrid approach • Startups, young companies CHOOSE THE RIGHT APPROACH
  • 18. • Access to data • Secure transfer • User behavior • Insider threat FIND AND SOLVE ISSUES
  • 19. • Be open to your employees • Implement policies • Train users • Be aware of new and leaving staff • Discuss everything! DEVELOP RESPONSIBILITY
  • 20. • Data Loss Prevention • Security audit • Encryption • Mobile security IMPLEMENT TECHNOLOGY
  • 21. • Based in Czech republic • Creating products for physical security • Management realizes the importance of data
  • 22. 1. Policies 2. Training using DLP notifications 3. Step-by-step protection of know-how 4. Monitoring of leaving employees
  • 23. Q & A
  • 24. THANK YOU FOR YOUR TIME ota.cermak@safetica.com Matej Zachar Project & Security Manager Ota Čermák Channel Sales Manager matej.zachar@safetica.com