SlideShare a Scribd company logo
www.holivia.com
WHAT
MATTERS IN
SECURITY
www.holivia.com
YOUR
CYBERSECURTY
LANDSCAPE
www.holivia.com
C-LEVEL CONCERNS AND ATTITUDES
1.30%
8.40%
14%
16%
23%
28%
28%
31%
35%
36%
42%
45%
0% 10% 20% 30% 40% 50%
Other
Integration
Compliance
Data-driven decision-making
Innovation
Automation
Monetisation/transformation
Employee productivity
Business agility
Customer/user experience
Business continuity and resilience
Information Security
Which tech objectives are priority?
35%
43%
48%
50%
50%
53%
66%
0% 10% 20% 30% 40% 50% 60% 70%
Another global outbreak of COVID-
19 or other different infectuous
disease
Tighter restrictions on the cross-
border movement of people and
goods
Protracted disription of global
supply chains
Failure of industries or sectors in
certain countries to properly recover
Cyberattacks and data fraud due to
a sustained shift in working
patterns
Surge in bankrupcies and industy
consolidations
Prolonged recession of the global
economy
Most worrisome for your company?
Source: World Economic Form, 2021
Directly related to security
www.holivia.com
ORGANISATIONS COMPROMISED BY
AT LEAST 1 ATTACK
62%
71%
76%
79%
77% 78%
81%
86%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2014 2015 2016 2017 2018 2019 2020 2021
www.holivia.com
NO SECTOR LEFT BEHIND
Source: Enisa, October 2021
0
50
100
150
200
www.holivia.com
SECURITY REPRESENTS YOUR STATE
Free from danger
or threat
Continuity
Enabled to advance
value
www.holivia.com
MULTI-VECTOR RISKS
• Disruption of services
• Compromised accounts
• Phishing
• Ransomware/Extortionware
• Denial of Service (DDoS)
attacks
• Employee ignorance
• Social Engineering
• Right precautions
• Impact of digital
transformation (on-prem,
cloud, hybrid)
• Control over IT Systems
• Systems security
• System vulnerabilities
• Layered security solutions
(Endpoint/Gateway)
• Data insecurity
• Improper backup/recovery
systems
• Regulatory compliance per
industry/area under
management
• Leaving default settings
• Sharing data with
unintended audiences
• Deletion of data
• Hardware failures
Knowledge /
Awareness
Cybercrime Mistakes
Due Diligence /
Regulatory
www.holivia.com
WHAT ATTACKERS TYPICALLY WANT
Disable
your ability
to work
Discredit
you
Your
digital
resources
or money
For personal
entertainment
or gain
Their Job / Hired
Service
or
www.holivia.com
CYBERCRIME
Source: Purplesec, Datto , Verison, 2021
600%
Cybercrime growth in
2020/2021, of which
86% are motivated by
financial gain.
43%
Of cyber-attacks target
small businesses, of which
70% are not equipped to
deal with such attacks
89%
Of MSPs reporting
ransomware as the
most common malware
threat to SMBs
90%
Of MSPs “very concerned”
about ransomware threats
with only 24% SMB clients
feeling the same
7.3 days
Average number of
days a ransomware
incident lasts
274K
Average cost (USD) of
ransomware incident
www.holivia.com
HIGHLY DISRUPTIVE
60 62
78
105
116
189 190
219
0
50
100
150
200
250
20 Q1 20 Q2 20 Q3 20 Q4 21 Q1 21 Q2 21 Q3 21 Q4 (Est)
Millions
Quarterly Attacks
Source: Datto, Sonicwall
2.5X
More damaging than
other incidents
5,600
(USD) Average global
ransom demand
274,000
(USD) Average downtime
cost of a ransomware attack
www.holivia.com
FINANCIAL IMPACT CATEGORIES
Additional Costs
Assistance & Emergency
Measures
Loss of Turnover &
Increase in cost of work
Liability Coverage
• Identification, assessment
and containment of security
incident (IT Forensic)
• Provision of external
expertise
• Provision of legal assistance
(Data breach of
confidentiality)
• Provision of crises
management or
communication assistance
• Restoring the IT system to
its state prior to the incident
• Maintaining operability of
the IT system
• Preparing claims
• Preventing or mitigating
liability exposure / improper
use of personal data (data
breach)
• Communication Strategy
• Notification to the
authorities and individuals
(data breach)
• Ransom
• Defense costs from an
investigation by a regulator
• Regulatory fines
• Defense costs and damages
arising out of claims made
by 3rd parties:
• Breach of confidentiality of
personal data
• Defamation, damage to
reputation, breach of
intellectual property,
violation of privacy etc.
• Business Interruption
• Extra expenses
www.holivia.com
GOVERNMENT & MARKET EXPECTATIONS
Scope
PCI DSS
Data
Sources
Security
Auditing
Right to
be
forgotten
Tooling
GDPR
Manage
Personal
Data
Law
Data
Training
Monitor
Use the effort to
implement to
differentiate your
brand by promoting
what you do to keep
your customers safe
www.holivia.com
FOR YOU THIS MEANS
Due Diligence
Due Care
Reasonable amount of
careful and persistent work to avoid
wilful ignorance, negligence, loss and
liability e.g., keeping policies and
standards, training, installing and
configuring security solutions like
antivirus, firewalls, VPNs
Pro-active processes invested in to
maintain and ensure the highest level of
performance while keeping your and third-
party assets
e.g., periodic audits, enforcing of policies, keeping solutions up to date e.g., AV and security updates,
implementing frameworks like ISO 127001, having formal change management processes,
researching and understanding legal responsibilities, conducting SLA negotiations
BUSINESS ASSETS
Core Products People
Operations
Value Chain
www.holivia.com
PROACTIVELY HANDLE YOUR
LEVEL OF RISK
DIGITAL ASSETS
READINESS TO
GROW
DIGITAL DEBT
COST BRAND EQUITY
PRIORITIES
TIMELINE
www.holivia.com
EXPANDING DIGITAL LANDSCAPE TO SECURE
Cloud Infrastructure
Desktops & Laptops
Applications
SaaS
Solutions
Servers
Networks
On-premise/ Hybrid
apps
Storage
(Local & Distributed)
Telecommunications
WFH Devices
Databases
Development &
Production
environments
Portable Devices &
Wearables
Data &
Data Management
Security
Data Centers
Operating Systems
Websites, Web APIs
and Web Portals
Email
Passwords
Audit info
www.holivia.com
CYBER-RELATED INSURANCE CLAIMS PER YEAR
80
249
495
849
1,114
1,217
0
200
400
600
800
1000
1200
1400
2016 2017 2018 2019 2020 1H 2021 (556) +
15% uplift on H2
Attacks
(all
-
including
ransomware)
Source: Allianz Insurance
www.holivia.com
READY TO DIVE
DEEPER?
www.holivia.com
LET’S TALK…WWW.HOLIVIA.COM
Macro and strategic trends in digital security for leaders trying to
understand and communicate what matters to be assured and secured.
Master the connection between business value and cybersecurity
management through a non-technical lens.
START
YOUR
CYBERSECURITY
LANDSCAPE
CYBERCRIME AS A
SERVICE
YES, YOU ARE A
TARGET OF INTEREST
DIGITAL
TRANSFORMATION
CYBER
RESILIENCE
www.holivia.com
This publication contains general information only and is being made available under the Terms of Services as published on
www.holivia.com.
This is an informational piece of work. In no way or means of this material, are we rendering accounting, business, financial, investment,
legal, tax, or other professional advice or services. This publication is not a substitute for engaged professional advice or services, nor
should it be used as a basis for any decision or action that may affect your business.
Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor to fully
assess your situation and context.
Holivia Ltd. shall not be responsible for any loss sustained by any person or organisation that relies on this publication.
Copyright © 2022 Holivia Ltd. All rights reserved
ABOUT

More Related Content

What's hot

Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Enterprise Mobile
 
Women in Technology Leadership
Women in Technology LeadershipWomen in Technology Leadership
Women in Technology Leadership
VARIndiaManishYadav
 
Challenges and Risks for the CIO from Outsourcing in the digital era
Challenges and Risks for the CIO from Outsourcing in the digital eraChallenges and Risks for the CIO from Outsourcing in the digital era
Challenges and Risks for the CIO from Outsourcing in the digital era
Antoine Vigneron
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
Accenture Technology
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
accenture
 
Third Annual State of Cyber Resilience | Portugal
Third Annual State of Cyber Resilience | PortugalThird Annual State of Cyber Resilience | Portugal
Third Annual State of Cyber Resilience | Portugal
accenture
 
The Software Defined Business
The Software Defined BusinessThe Software Defined Business
The Software Defined Business
IDC Italy
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
SolarWinds
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
finance40
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Happiest Minds Technologies
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insurance
accenture
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
Accenture Technology
 
2016 CIO Agenda
2016 CIO Agenda2016 CIO Agenda
2016 CIO Agenda
Den Reymer
 
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is HereAccenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
accenture
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
accenture
 
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
InnoTech
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
accenture
 
The state of cyber resilience in the UK
The state of cyber resilience in the UKThe state of cyber resilience in the UK
The state of cyber resilience in the UK
Ipsos UK
 
Technology Vision for Insurance 2019
Technology Vision for Insurance 2019Technology Vision for Insurance 2019
Technology Vision for Insurance 2019
Accenture Insurance
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
Franco Ferrario
 

What's hot (20)

Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Women in Technology Leadership
Women in Technology LeadershipWomen in Technology Leadership
Women in Technology Leadership
 
Challenges and Risks for the CIO from Outsourcing in the digital era
Challenges and Risks for the CIO from Outsourcing in the digital eraChallenges and Risks for the CIO from Outsourcing in the digital era
Challenges and Risks for the CIO from Outsourcing in the digital era
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Third Annual State of Cyber Resilience | Portugal
Third Annual State of Cyber Resilience | PortugalThird Annual State of Cyber Resilience | Portugal
Third Annual State of Cyber Resilience | Portugal
 
The Software Defined Business
The Software Defined BusinessThe Software Defined Business
The Software Defined Business
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insurance
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
2016 CIO Agenda
2016 CIO Agenda2016 CIO Agenda
2016 CIO Agenda
 
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is HereAccenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
 
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
The state of cyber resilience in the UK
The state of cyber resilience in the UKThe state of cyber resilience in the UK
The state of cyber resilience in the UK
 
Technology Vision for Insurance 2019
Technology Vision for Insurance 2019Technology Vision for Insurance 2019
Technology Vision for Insurance 2019
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
 

Similar to What matters in security - A highlighter

Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
Mr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stagesMr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stages
IDATE DigiWorld
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Bill Burns
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
SensePost
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
Bitglass
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
Kenny Chia Wei Hao
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds
 
Deep Dive into Operational Technology Security - USCSI®.pdf
Deep Dive into Operational Technology Security - USCSI®.pdfDeep Dive into Operational Technology Security - USCSI®.pdf
Deep Dive into Operational Technology Security - USCSI®.pdf
United States Cybersecurity Institute (USCSI®)
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
TBledsoe
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Microsoft
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
Bob Maley
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
Committee of iCIO Community
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Ivanti
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
Matteo Masi
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
Vincent Kwon
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
Peggy Lawless
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
Team Finland Future Watch
 

Similar to What matters in security - A highlighter (20)

Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Mr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stagesMr Jackson Verizon IP at all stages
Mr Jackson Verizon IP at all stages
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016
 
Deep Dive into Operational Technology Security - USCSI®.pdf
Deep Dive into Operational Technology Security - USCSI®.pdfDeep Dive into Operational Technology Security - USCSI®.pdf
Deep Dive into Operational Technology Security - USCSI®.pdf
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 

Recently uploaded

Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 

What matters in security - A highlighter

  • 3. www.holivia.com C-LEVEL CONCERNS AND ATTITUDES 1.30% 8.40% 14% 16% 23% 28% 28% 31% 35% 36% 42% 45% 0% 10% 20% 30% 40% 50% Other Integration Compliance Data-driven decision-making Innovation Automation Monetisation/transformation Employee productivity Business agility Customer/user experience Business continuity and resilience Information Security Which tech objectives are priority? 35% 43% 48% 50% 50% 53% 66% 0% 10% 20% 30% 40% 50% 60% 70% Another global outbreak of COVID- 19 or other different infectuous disease Tighter restrictions on the cross- border movement of people and goods Protracted disription of global supply chains Failure of industries or sectors in certain countries to properly recover Cyberattacks and data fraud due to a sustained shift in working patterns Surge in bankrupcies and industy consolidations Prolonged recession of the global economy Most worrisome for your company? Source: World Economic Form, 2021 Directly related to security
  • 4. www.holivia.com ORGANISATIONS COMPROMISED BY AT LEAST 1 ATTACK 62% 71% 76% 79% 77% 78% 81% 86% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2014 2015 2016 2017 2018 2019 2020 2021
  • 5. www.holivia.com NO SECTOR LEFT BEHIND Source: Enisa, October 2021 0 50 100 150 200
  • 6. www.holivia.com SECURITY REPRESENTS YOUR STATE Free from danger or threat Continuity Enabled to advance value
  • 7. www.holivia.com MULTI-VECTOR RISKS • Disruption of services • Compromised accounts • Phishing • Ransomware/Extortionware • Denial of Service (DDoS) attacks • Employee ignorance • Social Engineering • Right precautions • Impact of digital transformation (on-prem, cloud, hybrid) • Control over IT Systems • Systems security • System vulnerabilities • Layered security solutions (Endpoint/Gateway) • Data insecurity • Improper backup/recovery systems • Regulatory compliance per industry/area under management • Leaving default settings • Sharing data with unintended audiences • Deletion of data • Hardware failures Knowledge / Awareness Cybercrime Mistakes Due Diligence / Regulatory
  • 8. www.holivia.com WHAT ATTACKERS TYPICALLY WANT Disable your ability to work Discredit you Your digital resources or money For personal entertainment or gain Their Job / Hired Service or
  • 9. www.holivia.com CYBERCRIME Source: Purplesec, Datto , Verison, 2021 600% Cybercrime growth in 2020/2021, of which 86% are motivated by financial gain. 43% Of cyber-attacks target small businesses, of which 70% are not equipped to deal with such attacks 89% Of MSPs reporting ransomware as the most common malware threat to SMBs 90% Of MSPs “very concerned” about ransomware threats with only 24% SMB clients feeling the same 7.3 days Average number of days a ransomware incident lasts 274K Average cost (USD) of ransomware incident
  • 10. www.holivia.com HIGHLY DISRUPTIVE 60 62 78 105 116 189 190 219 0 50 100 150 200 250 20 Q1 20 Q2 20 Q3 20 Q4 21 Q1 21 Q2 21 Q3 21 Q4 (Est) Millions Quarterly Attacks Source: Datto, Sonicwall 2.5X More damaging than other incidents 5,600 (USD) Average global ransom demand 274,000 (USD) Average downtime cost of a ransomware attack
  • 11. www.holivia.com FINANCIAL IMPACT CATEGORIES Additional Costs Assistance & Emergency Measures Loss of Turnover & Increase in cost of work Liability Coverage • Identification, assessment and containment of security incident (IT Forensic) • Provision of external expertise • Provision of legal assistance (Data breach of confidentiality) • Provision of crises management or communication assistance • Restoring the IT system to its state prior to the incident • Maintaining operability of the IT system • Preparing claims • Preventing or mitigating liability exposure / improper use of personal data (data breach) • Communication Strategy • Notification to the authorities and individuals (data breach) • Ransom • Defense costs from an investigation by a regulator • Regulatory fines • Defense costs and damages arising out of claims made by 3rd parties: • Breach of confidentiality of personal data • Defamation, damage to reputation, breach of intellectual property, violation of privacy etc. • Business Interruption • Extra expenses
  • 12. www.holivia.com GOVERNMENT & MARKET EXPECTATIONS Scope PCI DSS Data Sources Security Auditing Right to be forgotten Tooling GDPR Manage Personal Data Law Data Training Monitor Use the effort to implement to differentiate your brand by promoting what you do to keep your customers safe
  • 13. www.holivia.com FOR YOU THIS MEANS Due Diligence Due Care Reasonable amount of careful and persistent work to avoid wilful ignorance, negligence, loss and liability e.g., keeping policies and standards, training, installing and configuring security solutions like antivirus, firewalls, VPNs Pro-active processes invested in to maintain and ensure the highest level of performance while keeping your and third- party assets e.g., periodic audits, enforcing of policies, keeping solutions up to date e.g., AV and security updates, implementing frameworks like ISO 127001, having formal change management processes, researching and understanding legal responsibilities, conducting SLA negotiations BUSINESS ASSETS Core Products People Operations Value Chain
  • 14. www.holivia.com PROACTIVELY HANDLE YOUR LEVEL OF RISK DIGITAL ASSETS READINESS TO GROW DIGITAL DEBT COST BRAND EQUITY PRIORITIES TIMELINE
  • 15. www.holivia.com EXPANDING DIGITAL LANDSCAPE TO SECURE Cloud Infrastructure Desktops & Laptops Applications SaaS Solutions Servers Networks On-premise/ Hybrid apps Storage (Local & Distributed) Telecommunications WFH Devices Databases Development & Production environments Portable Devices & Wearables Data & Data Management Security Data Centers Operating Systems Websites, Web APIs and Web Portals Email Passwords Audit info
  • 16. www.holivia.com CYBER-RELATED INSURANCE CLAIMS PER YEAR 80 249 495 849 1,114 1,217 0 200 400 600 800 1000 1200 1400 2016 2017 2018 2019 2020 1H 2021 (556) + 15% uplift on H2 Attacks (all - including ransomware) Source: Allianz Insurance
  • 18. www.holivia.com LET’S TALK…WWW.HOLIVIA.COM Macro and strategic trends in digital security for leaders trying to understand and communicate what matters to be assured and secured. Master the connection between business value and cybersecurity management through a non-technical lens. START YOUR CYBERSECURITY LANDSCAPE CYBERCRIME AS A SERVICE YES, YOU ARE A TARGET OF INTEREST DIGITAL TRANSFORMATION CYBER RESILIENCE
  • 19. www.holivia.com This publication contains general information only and is being made available under the Terms of Services as published on www.holivia.com. This is an informational piece of work. In no way or means of this material, are we rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for engaged professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor to fully assess your situation and context. Holivia Ltd. shall not be responsible for any loss sustained by any person or organisation that relies on this publication. Copyright © 2022 Holivia Ltd. All rights reserved ABOUT