SlideShare a Scribd company logo
SouthWestCSC.org@SouthWestCSC
4 Simple Steps to Cyber Security
Torbay Business Forum
12th Jan 2016
Geoff Revill – Krowdthink Ltd
Peter Jones - Dynamiq
SouthWestCSC.org
SouthWestCSC.org@SouthWestCSC
Who we are
Organisations and stakeholders in the South West of England
who are actively engaged in, or dependent on, cyber and
digital security
Our membership includes academia, the police, businesses
and enterprises from across the region that either:
• supply cyber security services
• rely on cyber security for the provision of other services
• have a public service interest in cyber, or
• are engaged in cyber training, education or research
SouthWestCSC.org@SouthWestCSC
What do we provide?
• Access to cyber skills and knowledge
• Share latest cyber thinking and best practice
• Help make your business more resilient
• Cyber Careers advice
• Cyber Professional development
• Learn how to protect yourself online
Be part of a cyber resilient future!
SouthWestCSC.org@SouthWestCSC
• Securious are passionate about getting the message out to SMEs
that they need to build resilience against the cyber threats.
• The only Cyber Essentials Certification Body in the South West
• Pete Woodward PCI QSA|CISSP|CEH|CCNP|CCDP - a highly qualified
and very experienced cyber security consultant.
• PCI QSA - Payment Card Industry Qualified Security Assessor
• CISSP - Certified Information Systems Security Professional
• CEH - Certified Ethical Hacker
• CCNP, CCDP - CISCO Certified Network and Design Professional
SouthWestCSC.org@SouthWestCSC
• Cyber Security solutions provider.
• Data Recovery.
• Digital Forensics.
• IT Support Services.
• Installations, Development and Support.
• Secure Cloud Storage.
• Website Development.
• ISO 9001 / 14001 / 27001 Auditors.
• Cyber Essentials Auditors.
0800 069 9788
@dynamiqthinking
www.dynamiq.co
SAFER, SMARTER, BETTER - TOGETHER
SouthWestCSC.org@SouthWestCSC
• Addressing the Human Factor
• Resilience and crisis response for military &
commercial clients
• Combatting the cyber threat:
– Cyber strategy development
– Board-level engagement
– Business risk and value analysis
– Awareness training
– Incident response planning
– Scenario analysis
– Table-top and simulated exercising
SouthWestCSC.org@SouthWestCSC
Supporting the Privacy
Perspective of Security
• Provide guidance on individual digital identity
management
• Help people online maintain their privacy
• Help you develop privacy preserving systems
• In SWCSC – Contact Geoff Revill for Event &
Marketing co-operation or support
– geoff@krowdthink.com
SouthWestCSC.org@SouthWestCSC
Anthony Odhams
SecureSearch
• 15 years expertise Search & Placement of Information
Security, Risk Management, Digital Forensics, e-
Discovery specialists
• Clients – Banks, Advisory & Consultancies, Solicitors,
Retailers, Vendors & Academia
• Role Levels – Director, Partner, Manager & Technical
with > 6 years cyber experience
• Membership Secretary SWCSC
SouthWestCSC.org@SouthWestCSC
• Protect: against current and future threats of
internet related crime
• Prepare: by increasing awareness and resilience
to enable communities and businesses to do
more for themselves.
• Prevent: people from engaging in crime and
from continuing in crime whilst supporting
communities and partners to be more effective in
stopping crime.
• Pursue: The criminals
SouthWestCSC.org@SouthWestCSC
The DARK WEB
The Threats
SouthWestCSC.org@SouthWestCSC
3.5Bn Online
How Many Have Been Hacked?
1.2 Billion login details
0.5 Billion email addresses
Reported for sale in 2014 on the Dark Web by
One Russian Cyber Gang
76M Bank Account user details
hacked at JP Morgan Bank
38% growth in cyber security incidents
2014->2015
Only 12% are reported!
SouthWestCSC.org@SouthWestCSC
Business Consequences
•breach of privacy law obligations
•regulatory fines
•individual loss claims
Loss of personal
data
•breach of contract
•loss of commercial advantage
•breach of regulatory obligations
•regulatory fines
Loss of confidential
information
•financial fraud
•extortion
•breach of regulatory obligations
•regulatory fines
Financial systems
•denial of service
•physical damage to plant and machinery
•industrial accidents
Operational control
systems
SouthWestCSC.org@SouthWestCSC
Who is accountable?
• Managing Directors blame:
– 57% hold themselves
accountable for major cyber
security breaches
– Some MDs also hold IT
accountable for major cyber
security breaches
• Financial Directors blame:
– mainly hold IT contractors
accountable
Who do MD’s blame apart from themselves?
SouthWestCSC.org@SouthWestCSC
The Weakest link
SouthWestCSC.org@SouthWestCSC
4 Simple Steps to Cyber Security
1 Basic Principle to Understand
Basic Principle
If unauthorised code cannot run you are
protected from 85% of cyber threats
SouthWestCSC.org@SouthWestCSC
4 Simple Steps to Cyber Security
①Patch your Operating Systems regularly
②Patch your key Applications regularly
– Browser, Java, Flash, PDF Viewer, Office apps
③Restrict Administrator Privileges to those that
really need them
④WhiteList the Applications you use
SouthWestCSC.org@SouthWestCSC
Lost?
SouthWestCSC.org@SouthWestCSC
That is what we are here for
SecureSearch
SouthWestCSC.org@SouthWestCSC

More Related Content

What's hot

BREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialBREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised Credential
Thycotic
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
TrustArc
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
TrustArc
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
TrustArc
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
Vishvendra Saini
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
Dan Michaluk
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
David Crozier
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
SurfWatch Labs
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
Dan Michaluk
 
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
TrustArc
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
Scott Suhy
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
centralohioissa
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
Eric Vanderburg
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
Gloucestershire Professionals
 
General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?
Leigh Hill
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
Kevin Duffey
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
Kate Carruthers
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy Program
Samir Pawaskar
 
Cyber Security Regulatory Landscape
Cyber Security Regulatory LandscapeCyber Security Regulatory Landscape
Cyber Security Regulatory Landscape
Samir Pawaskar
 

What's hot (20)

BREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialBREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised Credential
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy Program
 
Cyber Security Regulatory Landscape
Cyber Security Regulatory LandscapeCyber Security Regulatory Landscape
Cyber Security Regulatory Landscape
 

Viewers also liked

Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
Stewart Benger
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
isc2-hellenic
 
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in BrightonBuilding an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Bill Harpley
 
Get yourself connected: Google Glass and the Internet of Bling
Get yourself connected: Google Glass and the Internet of BlingGet yourself connected: Google Glass and the Internet of Bling
Get yourself connected: Google Glass and the Internet of Bling
Bill Harpley
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
isc2-hellenic
 
Google Glass By The Numbers
Google Glass By The NumbersGoogle Glass By The Numbers
Google Glass By The Numbers
Auggy Augmate
 

Viewers also liked (6)

Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
 
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in BrightonBuilding an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
 
Get yourself connected: Google Glass and the Internet of Bling
Get yourself connected: Google Glass and the Internet of BlingGet yourself connected: Google Glass and the Internet of Bling
Get yourself connected: Google Glass and the Internet of Bling
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Google Glass By The Numbers
Google Glass By The NumbersGoogle Glass By The Numbers
Google Glass By The Numbers
 

Similar to Torbay Business Forum with the South West Cyber Security Cluster

South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
Peter Jones
 
South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
Peter Jones
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
OCTF Industry Engagement
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
Lucy Denver
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
Joe Nathans
 
Cyber security
Cyber securityCyber security
Cyber security
Perfect Training Center
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
OCTF Industry Engagement
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
Ray Bugg
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
James Mulhern
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
OCTF Industry Engagement
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
ChristiAKannapel
 
IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
Gabor Szathmari
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
Misha Hanin
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
OCTF Industry Engagement
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
hdicapitalarea
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
Mourad Khalil
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
AT-NET Services, Inc. - Charleston Division
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting Introduction
Blackbaud
 

Similar to Torbay Business Forum with the South West Cyber Security Cluster (20)

South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
 
South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cyber security
Cyber securityCyber security
Cyber security
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
 
IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting Introduction
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Torbay Business Forum with the South West Cyber Security Cluster

  • 1. SouthWestCSC.org@SouthWestCSC 4 Simple Steps to Cyber Security Torbay Business Forum 12th Jan 2016 Geoff Revill – Krowdthink Ltd Peter Jones - Dynamiq SouthWestCSC.org
  • 2. SouthWestCSC.org@SouthWestCSC Who we are Organisations and stakeholders in the South West of England who are actively engaged in, or dependent on, cyber and digital security Our membership includes academia, the police, businesses and enterprises from across the region that either: • supply cyber security services • rely on cyber security for the provision of other services • have a public service interest in cyber, or • are engaged in cyber training, education or research
  • 3. SouthWestCSC.org@SouthWestCSC What do we provide? • Access to cyber skills and knowledge • Share latest cyber thinking and best practice • Help make your business more resilient • Cyber Careers advice • Cyber Professional development • Learn how to protect yourself online Be part of a cyber resilient future!
  • 4. SouthWestCSC.org@SouthWestCSC • Securious are passionate about getting the message out to SMEs that they need to build resilience against the cyber threats. • The only Cyber Essentials Certification Body in the South West • Pete Woodward PCI QSA|CISSP|CEH|CCNP|CCDP - a highly qualified and very experienced cyber security consultant. • PCI QSA - Payment Card Industry Qualified Security Assessor • CISSP - Certified Information Systems Security Professional • CEH - Certified Ethical Hacker • CCNP, CCDP - CISCO Certified Network and Design Professional
  • 5. SouthWestCSC.org@SouthWestCSC • Cyber Security solutions provider. • Data Recovery. • Digital Forensics. • IT Support Services. • Installations, Development and Support. • Secure Cloud Storage. • Website Development. • ISO 9001 / 14001 / 27001 Auditors. • Cyber Essentials Auditors. 0800 069 9788 @dynamiqthinking www.dynamiq.co SAFER, SMARTER, BETTER - TOGETHER
  • 6. SouthWestCSC.org@SouthWestCSC • Addressing the Human Factor • Resilience and crisis response for military & commercial clients • Combatting the cyber threat: – Cyber strategy development – Board-level engagement – Business risk and value analysis – Awareness training – Incident response planning – Scenario analysis – Table-top and simulated exercising
  • 7. SouthWestCSC.org@SouthWestCSC Supporting the Privacy Perspective of Security • Provide guidance on individual digital identity management • Help people online maintain their privacy • Help you develop privacy preserving systems • In SWCSC – Contact Geoff Revill for Event & Marketing co-operation or support – geoff@krowdthink.com
  • 8. SouthWestCSC.org@SouthWestCSC Anthony Odhams SecureSearch • 15 years expertise Search & Placement of Information Security, Risk Management, Digital Forensics, e- Discovery specialists • Clients – Banks, Advisory & Consultancies, Solicitors, Retailers, Vendors & Academia • Role Levels – Director, Partner, Manager & Technical with > 6 years cyber experience • Membership Secretary SWCSC
  • 9. SouthWestCSC.org@SouthWestCSC • Protect: against current and future threats of internet related crime • Prepare: by increasing awareness and resilience to enable communities and businesses to do more for themselves. • Prevent: people from engaging in crime and from continuing in crime whilst supporting communities and partners to be more effective in stopping crime. • Pursue: The criminals
  • 11. SouthWestCSC.org@SouthWestCSC 3.5Bn Online How Many Have Been Hacked? 1.2 Billion login details 0.5 Billion email addresses Reported for sale in 2014 on the Dark Web by One Russian Cyber Gang 76M Bank Account user details hacked at JP Morgan Bank 38% growth in cyber security incidents 2014->2015 Only 12% are reported!
  • 12. SouthWestCSC.org@SouthWestCSC Business Consequences •breach of privacy law obligations •regulatory fines •individual loss claims Loss of personal data •breach of contract •loss of commercial advantage •breach of regulatory obligations •regulatory fines Loss of confidential information •financial fraud •extortion •breach of regulatory obligations •regulatory fines Financial systems •denial of service •physical damage to plant and machinery •industrial accidents Operational control systems
  • 13. SouthWestCSC.org@SouthWestCSC Who is accountable? • Managing Directors blame: – 57% hold themselves accountable for major cyber security breaches – Some MDs also hold IT accountable for major cyber security breaches • Financial Directors blame: – mainly hold IT contractors accountable Who do MD’s blame apart from themselves?
  • 15. SouthWestCSC.org@SouthWestCSC 4 Simple Steps to Cyber Security 1 Basic Principle to Understand Basic Principle If unauthorised code cannot run you are protected from 85% of cyber threats
  • 16. SouthWestCSC.org@SouthWestCSC 4 Simple Steps to Cyber Security ①Patch your Operating Systems regularly ②Patch your key Applications regularly – Browser, Java, Flash, PDF Viewer, Office apps ③Restrict Administrator Privileges to those that really need them ④WhiteList the Applications you use
  • 18. SouthWestCSC.org@SouthWestCSC That is what we are here for SecureSearch