SlideShare a Scribd company logo
© PA Knowledge Limited 2014
1
INFOSECURITY
MAGAZINE WEBINAR:
INSIGHTS INTO
INCIDENT RESPONSE –
A VIEW FROM THE
FRONT LINES
Mark Skilton
Digital Innovation Expert, PA Consulting
Mark.Skilton@PAConsulting.com
Professor of Practice, Information
Systems Management & Innovation
Warwick Business School
+44 7808039240
© PA Knowledge Limited 2014
2
Sony – movie and Private Data Theft,
North Korean influence..
Anthem – 80 million US medical
insurance records stolen
Cyber security – Smash and Grab versus stealth attacks
“SMASH & GRAB”
POLITICAL, CAUSE
STEALTHNEW METHODS OF ACCESS
AND PREVASIVENESS
Russian banks Malware “attack”
$1 Billion stolen incrementally
© PA Knowledge Limited 2014
3
Cyber Security – Cyber governance
ZERO DAY ATTACKS
NEW THREAT VECTORS
NEW ASSET TARGETS (MEDICAL, FINANCIAL..
NEW LEVELS OF
CYBER GOVERNANCE
FINER GRAINED
MONTORING
ADVANCED RESPONSE
THREAT MANAGEMENT
PRIVACY, CONFIDENTIALITY, (TECHNICAL) SECURITY , TRUST
INCREASED COMPLEXITY
© PA Knowledge Limited 2014
4
PCST MODEL NEEDS TO BE MORE ADVANCED
PARADOX OF OPENNESS VERSUS CONTROL VERSUS PRIVACY
© PA Knowledge Limited 2014
5
Establish a DIGITAL TRUST FRAMEWORK - Source : PA Consulting Digital TL
“ I “ “ You “ “ Us “ “ We “ “ They “ “ Them “ “ local “ “ Global ”
How
What
Where
© PA Knowledge Limited 2014
6
• Better perimeter and environment awareness
• The length of time typically have access to victims’ environments
• New finer grained usage and access
• Third party compromises – how many companies are affected and how to detect
• Consortiums – shared cyber intelligence - Multi-model
• The complexity of attribution as the lines blur between tactics used by cyber-criminals
and nation-state actors
• New legal and technical capabilities
• The stealthy new tactics cyber-criminals deploy in order to move laterally and maintain
persistence in victim environments.
Conclusions
© PA Knowledge Limited 2014
7
Thank you
© PA Knowledge Limited 2014
8
The tools and techniques of advanced persistent threat (APT) actors are constantly evolving, putting
pressure on organizations to regularly review and enhance their security posture and defense
readiness.
Organizations can take a range of approaches to improve the way they detect, respond to and contain
advanced attacks. Key to the way they organize their defenses and incident response plans is
intelligence gleaned from analysts and research reports.
This webinar will call on a range of industry experts to deliver their findings and best practice advice on
the issue of incident response. FireEye will be presenting on the key insights drawn from its M-Trends
2015 report, compiled from hundreds of incident response investigations.
Topics for discussion include:
• The length of time typically have access to victims’ environments
• Third party compromises – how many companies are affected and how to detect
• The complexity of attribution as the lines blur between tactics used by cyber-criminals and nation-
state actors
• The stealthy new tactics cyber-criminals deploy in order to move laterally and maintain persistence in
victim environments.
Insights into Incident Response – A View from the Front Lines
https://www.infosecurity-magazine.com/webinars/incident-response-view-from-the/
© PA Knowledge Limited 2014
9
August 2015 Building the Digital Economy
http://www.palgrave.com/page/detail/Building-a-Digital-
Enterprise/?K=9781137477705
http://building-the-digital-enterprise.com/
© PA Knowledge Limited 2014
10
An accomplished business technology leader who has worked for
many fortune 500 companies in over 20 countries, across private and
public industry sectors. Mark is currently a Digital Expert at PA
Consulting with experience in leadership innovation and strategy for
digital platforms, big data, cloud computing, interoperability, metrics
monetization and cyber security. He has worked at board level in
strategic vision and corporate planning for Business and digital media
solutions in companies including media, telecoms, aerospace, retail ,
travel , city, central and local government, logistics. Healthcare and
financial services.
Mark is recognized international thought leader, speaking at
internationally including the EU Commission and several Industry
conferences and live TV and Radio and digital media including BBC,
Sky, FT, BBC.com and widely syndicated globally. He is an author of
two books on building Digital Enterprise for Palgrave macmillan Digital
Economy series and a co collaborator on several International
Standards with ISO and The Open group. He is also Professor of
Practice in Information Systems Management and Innovation at
Warwick Business School.
Mark Skilton
Mark Skilton
Digital Expert
PA Consulting
mark.skilton@PAConsulting.com
@mskilton
+44 7808039240

More Related Content

What's hot

OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
innovationoecd
 
Digital Platform Economy
Digital Platform EconomyDigital Platform Economy
Digital Platform Economy
Grow VC Group
 
Top global mega trends
Top global mega trends Top global mega trends
Top global mega trends
ebuc
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Son Phan
 
Indonesian Tech Ecosystem Report - Bits by Bricks
Indonesian Tech Ecosystem Report - Bits by BricksIndonesian Tech Ecosystem Report - Bits by Bricks
Indonesian Tech Ecosystem Report - Bits by Bricks
Rama Manusama
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
Evgeny Tsarkov
 
Capgemini digital transformation innovation presentation final s
Capgemini digital transformation innovation presentation final sCapgemini digital transformation innovation presentation final s
Capgemini digital transformation innovation presentation final s
Ben Gilchriest
 
The future of digital government services in the era of smart cities
The future of digital government services in the era of smart citiesThe future of digital government services in the era of smart cities
The future of digital government services in the era of smart cities
Saeed Al Dhaheri
 
5 g hr keynote
5 g   hr keynote5 g   hr keynote
5 g hr keynote
Peter Clemons
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Rick Bouter
 
Comarch Cloud - An optimal environment for Nicols' business
Comarch Cloud - An optimal environment for Nicols' businessComarch Cloud - An optimal environment for Nicols' business
Comarch Cloud - An optimal environment for Nicols' business
Comarch
 
Enterprise Digital Transformation – Trends & Strategy
Enterprise Digital Transformation – Trends & StrategyEnterprise Digital Transformation – Trends & Strategy
Enterprise Digital Transformation – Trends & Strategy
Somenath Nag
 
Digital Trend Study 2022 - "New Digital Fronts".
Digital Trend Study 2022 - "New Digital Fronts".Digital Trend Study 2022 - "New Digital Fronts".
Digital Trend Study 2022 - "New Digital Fronts".
Space and Lemon Innovations
 
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale SMAU
 
Unlocking_the_potential_of_the_Internet_of_Things_Full_report
Unlocking_the_potential_of_the_Internet_of_Things_Full_reportUnlocking_the_potential_of_the_Internet_of_Things_Full_report
Unlocking_the_potential_of_the_Internet_of_Things_Full_reportJohan Valk
 
HEC Digital Business. Digital Business
HEC Digital Business. Digital BusinessHEC Digital Business. Digital Business
HEC Digital Business. Digital Business
André Blavier
 
6 Biggest Business Technology Trends in 2020
6 Biggest Business Technology Trends in 2020 6 Biggest Business Technology Trends in 2020
6 Biggest Business Technology Trends in 2020
Neil Haboush Judgement
 
Digital Government - Cloud best practices
Digital Government - Cloud best practicesDigital Government - Cloud best practices
Digital Government - Cloud best practices
Cloud Best Practices Network
 
Digital Transformation in Customer Service: Roadmap for Success in 2014
Digital Transformation in Customer Service: Roadmap for Success in 2014Digital Transformation in Customer Service: Roadmap for Success in 2014
Digital Transformation in Customer Service: Roadmap for Success in 2014
Ajit Khadd
 
12 building blocks of digital enterprise
12 building blocks of digital enterprise12 building blocks of digital enterprise
12 building blocks of digital enterprise
Rahul Neel Mani
 

What's hot (20)

OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
OECD Digital Economy Outlook 2017: Setting the foundations for the digital tr...
 
Digital Platform Economy
Digital Platform EconomyDigital Platform Economy
Digital Platform Economy
 
Top global mega trends
Top global mega trends Top global mega trends
Top global mega trends
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
 
Indonesian Tech Ecosystem Report - Bits by Bricks
Indonesian Tech Ecosystem Report - Bits by BricksIndonesian Tech Ecosystem Report - Bits by Bricks
Indonesian Tech Ecosystem Report - Bits by Bricks
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
Capgemini digital transformation innovation presentation final s
Capgemini digital transformation innovation presentation final sCapgemini digital transformation innovation presentation final s
Capgemini digital transformation innovation presentation final s
 
The future of digital government services in the era of smart cities
The future of digital government services in the era of smart citiesThe future of digital government services in the era of smart cities
The future of digital government services in the era of smart cities
 
5 g hr keynote
5 g   hr keynote5 g   hr keynote
5 g hr keynote
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...
 
Comarch Cloud - An optimal environment for Nicols' business
Comarch Cloud - An optimal environment for Nicols' businessComarch Cloud - An optimal environment for Nicols' business
Comarch Cloud - An optimal environment for Nicols' business
 
Enterprise Digital Transformation – Trends & Strategy
Enterprise Digital Transformation – Trends & StrategyEnterprise Digital Transformation – Trends & Strategy
Enterprise Digital Transformation – Trends & Strategy
 
Digital Trend Study 2022 - "New Digital Fronts".
Digital Trend Study 2022 - "New Digital Fronts".Digital Trend Study 2022 - "New Digital Fronts".
Digital Trend Study 2022 - "New Digital Fronts".
 
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
Comprendere il Cloud e le altre correnti scatenanti la trasformazione digitale
 
Unlocking_the_potential_of_the_Internet_of_Things_Full_report
Unlocking_the_potential_of_the_Internet_of_Things_Full_reportUnlocking_the_potential_of_the_Internet_of_Things_Full_report
Unlocking_the_potential_of_the_Internet_of_Things_Full_report
 
HEC Digital Business. Digital Business
HEC Digital Business. Digital BusinessHEC Digital Business. Digital Business
HEC Digital Business. Digital Business
 
6 Biggest Business Technology Trends in 2020
6 Biggest Business Technology Trends in 2020 6 Biggest Business Technology Trends in 2020
6 Biggest Business Technology Trends in 2020
 
Digital Government - Cloud best practices
Digital Government - Cloud best practicesDigital Government - Cloud best practices
Digital Government - Cloud best practices
 
Digital Transformation in Customer Service: Roadmap for Success in 2014
Digital Transformation in Customer Service: Roadmap for Success in 2014Digital Transformation in Customer Service: Roadmap for Success in 2014
Digital Transformation in Customer Service: Roadmap for Success in 2014
 
12 building blocks of digital enterprise
12 building blocks of digital enterprise12 building blocks of digital enterprise
12 building blocks of digital enterprise
 

Similar to Infosecurity magazine webinar v2

Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Hewlett Packard Enterprise Business Value Exchange
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
Team Finland Future Watch
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
Team Finland Future Watch
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
Christian F. Nissen
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Ernst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
NishantSisodiya
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
Welch LLP
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
Nakhoudah
 
cyberready-solutions
cyberready-solutionscyberready-solutions
cyberready-solutionsNoah Kline
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
Symptai Consulting Limited
 

Similar to Infosecurity magazine webinar v2 (20)

Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
cyberready-solutions
cyberready-solutionscyberready-solutions
cyberready-solutions
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 

More from Mark Skilton

Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1
Mark Skilton
 
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Mark Skilton
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Mark Skilton
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
Mark Skilton
 
Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...
Mark Skilton
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Mark Skilton
 
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Mark Skilton
 
EU digital agenda event standards capgemini mark skilton june 2011
EU digital agenda event standards capgemini  mark skilton june 2011EU digital agenda event standards capgemini  mark skilton june 2011
EU digital agenda event standards capgemini mark skilton june 2011
Mark Skilton
 
Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...
Mark Skilton
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
Mark Skilton
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1
Mark Skilton
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Mark Skilton
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Mark Skilton
 

More from Mark Skilton (13)

Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1Build the digital enterprise mark skilton copyright 2014 v1
Build the digital enterprise mark skilton copyright 2014 v1
 
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
 
Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
 
EU digital agenda event standards capgemini mark skilton june 2011
EU digital agenda event standards capgemini  mark skilton june 2011EU digital agenda event standards capgemini  mark skilton june 2011
EU digital agenda event standards capgemini mark skilton june 2011
 
Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...Cloud computing metrics for successful business architecture and strategy cap...
Cloud computing metrics for successful business architecture and strategy cap...
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
 

Recently uploaded

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 

Recently uploaded (20)

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 

Infosecurity magazine webinar v2

  • 1. © PA Knowledge Limited 2014 1 INFOSECURITY MAGAZINE WEBINAR: INSIGHTS INTO INCIDENT RESPONSE – A VIEW FROM THE FRONT LINES Mark Skilton Digital Innovation Expert, PA Consulting Mark.Skilton@PAConsulting.com Professor of Practice, Information Systems Management & Innovation Warwick Business School +44 7808039240
  • 2. © PA Knowledge Limited 2014 2 Sony – movie and Private Data Theft, North Korean influence.. Anthem – 80 million US medical insurance records stolen Cyber security – Smash and Grab versus stealth attacks “SMASH & GRAB” POLITICAL, CAUSE STEALTHNEW METHODS OF ACCESS AND PREVASIVENESS Russian banks Malware “attack” $1 Billion stolen incrementally
  • 3. © PA Knowledge Limited 2014 3 Cyber Security – Cyber governance ZERO DAY ATTACKS NEW THREAT VECTORS NEW ASSET TARGETS (MEDICAL, FINANCIAL.. NEW LEVELS OF CYBER GOVERNANCE FINER GRAINED MONTORING ADVANCED RESPONSE THREAT MANAGEMENT PRIVACY, CONFIDENTIALITY, (TECHNICAL) SECURITY , TRUST INCREASED COMPLEXITY
  • 4. © PA Knowledge Limited 2014 4 PCST MODEL NEEDS TO BE MORE ADVANCED PARADOX OF OPENNESS VERSUS CONTROL VERSUS PRIVACY
  • 5. © PA Knowledge Limited 2014 5 Establish a DIGITAL TRUST FRAMEWORK - Source : PA Consulting Digital TL “ I “ “ You “ “ Us “ “ We “ “ They “ “ Them “ “ local “ “ Global ” How What Where
  • 6. © PA Knowledge Limited 2014 6 • Better perimeter and environment awareness • The length of time typically have access to victims’ environments • New finer grained usage and access • Third party compromises – how many companies are affected and how to detect • Consortiums – shared cyber intelligence - Multi-model • The complexity of attribution as the lines blur between tactics used by cyber-criminals and nation-state actors • New legal and technical capabilities • The stealthy new tactics cyber-criminals deploy in order to move laterally and maintain persistence in victim environments. Conclusions
  • 7. © PA Knowledge Limited 2014 7 Thank you
  • 8. © PA Knowledge Limited 2014 8 The tools and techniques of advanced persistent threat (APT) actors are constantly evolving, putting pressure on organizations to regularly review and enhance their security posture and defense readiness. Organizations can take a range of approaches to improve the way they detect, respond to and contain advanced attacks. Key to the way they organize their defenses and incident response plans is intelligence gleaned from analysts and research reports. This webinar will call on a range of industry experts to deliver their findings and best practice advice on the issue of incident response. FireEye will be presenting on the key insights drawn from its M-Trends 2015 report, compiled from hundreds of incident response investigations. Topics for discussion include: • The length of time typically have access to victims’ environments • Third party compromises – how many companies are affected and how to detect • The complexity of attribution as the lines blur between tactics used by cyber-criminals and nation- state actors • The stealthy new tactics cyber-criminals deploy in order to move laterally and maintain persistence in victim environments. Insights into Incident Response – A View from the Front Lines https://www.infosecurity-magazine.com/webinars/incident-response-view-from-the/
  • 9. © PA Knowledge Limited 2014 9 August 2015 Building the Digital Economy http://www.palgrave.com/page/detail/Building-a-Digital- Enterprise/?K=9781137477705 http://building-the-digital-enterprise.com/
  • 10. © PA Knowledge Limited 2014 10 An accomplished business technology leader who has worked for many fortune 500 companies in over 20 countries, across private and public industry sectors. Mark is currently a Digital Expert at PA Consulting with experience in leadership innovation and strategy for digital platforms, big data, cloud computing, interoperability, metrics monetization and cyber security. He has worked at board level in strategic vision and corporate planning for Business and digital media solutions in companies including media, telecoms, aerospace, retail , travel , city, central and local government, logistics. Healthcare and financial services. Mark is recognized international thought leader, speaking at internationally including the EU Commission and several Industry conferences and live TV and Radio and digital media including BBC, Sky, FT, BBC.com and widely syndicated globally. He is an author of two books on building Digital Enterprise for Palgrave macmillan Digital Economy series and a co collaborator on several International Standards with ISO and The Open group. He is also Professor of Practice in Information Systems Management and Innovation at Warwick Business School. Mark Skilton Mark Skilton Digital Expert PA Consulting mark.skilton@PAConsulting.com @mskilton +44 7808039240