SlideShare a Scribd company logo
1
2
James Burchell
Senior Sales Engineer
Will your business get hacked?
3
Large
Companies
81%
£600k - £1.5m
Small
Companies
60%
£65k - £115k
Large
Companies
90%
£1.46m -
£3.14m
Small
Companies
75%
£75k - £311k
4
2016: The year of the bigger problems?
5
www.informationisbeautiful.net
6
4,000 data breaches in 3 years
Computing.co.uk
Over 170 law firms investigated in 1
year
Computing.co.uk
All major UK banks and lenders
reported data breaches
Computing.co.uk
¾ of customers would reconsider
using a company
Computing.co.uk
Who’s to blame?
7
Nearly 300,000 customers lost
Computing.co.uk
159,959 accounts compromised
Computing.co.uk
Total cost £40- £45 million
Computing.co.uk
£15 million lost in trading value
Computing.co.uk
BT picked up 40% of unhappy
customers
Computing.co.uk
8
Spending on IT Security and Documenting Security Policies Is Increasing
…Is the TOP Priority For CIOs…
Top 3 priorities
Modernization
innovation
#2
Cloud
mobility
#3
Information Security Is a Priority
For Top Management…
Cyber security /
IT security
#1
…Increasing the Spend On Security Projects in All
Categories
YoY increase in spend in external IT projects
Spending growth expectations in January 2015
Source: PWC Source: Morgan Stanley research
Responses to rising risks
2014 2015
Source: Grant Thornton survey
Note:
1. Large organizations and small businesses consist of enterprises with >250 employees and <50 employees respectively, priority levels for medium sized businesses (50-249 employees) are similar to those for small businesses
(1)
(1)
9
10
Complexity nightmare of Endpoint and Network
Security Analytics
• Multiple incompatible interfaces
• Resource intensive
• Manual integration
• Dependent upon human analysis
• Manual Threat/Incident response
• Extra products that are unaware of each other
• Manual correlation
• Support nightmare
Traditional firewall
Email gateway
Web gateway
NG Firewall
Sandbox
Network Behaviour
Analytics
SIEM
Traditional
anti-malware
Encryption
Web, Device and App
Control
“Next Generation”
Detection
“Next Generation”
Remediation
“Next Generation”
Prevention
11
5.5 million things
connected every day
1
20
15
10
5
Billions
2001 20202014
1.2B
20.8B
6.4B
2016
12
Embedded
systems
Consumer
technologies
Operational
systems
Mobile devices
New security landscape
36%
2015
30%
29%
26%
24%
2014
13% 11% 10%
13
The fragility of privacy
14
Safe Harbour
15
“For many years, we have used
encryption to protect our
customers’ personal data
because we believe it’s the only
way to keep their information
safe.”
Tim Cook, CEO of Apple
16
Up to 35% would Sell company
information
Computing.co.uk
17
Passwords…
1. 123456
2. password
3. 12345678
4. qwerty
5. 12345
6. 123456789
7. football
8. 1234
9. 1234567
10. baseball
11. welcome
12. 1234567890
13. abc123
14. 111111
15. 1qaz2wzx
16. dragon
17. master
18. monkey
19. letmein
20. login
18
“Two things are infinite: The
universe and human stupidity,
and I’m not so sure about the
former.”
- Albert Einstein
19
Understanding vulnerabilities
User error
Flaws
Features
20
Trends
Security Breaches on the rise
21
Firewall
Web
Email
Wireless
Reducing the threat - Protect
Endpoint
Encryption
Server
Mobile
Insight & Analysis
Better Protection
Intelligence Sharing
21
22
IT Controls
Configuration
Visibility
Reducing the threat - Control
23
Reducing the threat - Educate
Passphrases not
passwords
Think before you click
Verify the call
24
Layered defense & automation
Analytics
Next-Gen
Firewall
Wireless
Web
Email
Disk Encryption
UTM
File Encryption
Endpoint
Next-Gen Endpoint
Mobile
Server
Cloud
Intelligence
Centralized Policy
Management
25© Sophos Ltd. All rights reserved.

More Related Content

What's hot

Network-Powered Wi-Fi Analytics
Network-Powered Wi-Fi AnalyticsNetwork-Powered Wi-Fi Analytics
Network-Powered Wi-Fi Analytics
Mike Leibovitz
 
Mobility and BYOD
Mobility and BYODMobility and BYOD
Mobility and BYODJay McBain
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
Luxus Worldwide
 
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Hacken_Ecosystem
 
Remote facility monitoring and control using IoT
Remote facility monitoring and control using IoTRemote facility monitoring and control using IoT
Remote facility monitoring and control using IoT
Bernhard Mehl
 
Insurance IoT Digital Report
Insurance IoT Digital ReportInsurance IoT Digital Report
Insurance IoT Digital Report
Zsófia Kulcsár
 
Innovation in the cloud - Reducing IP risk for Financial Services
Innovation in the cloud - Reducing IP risk for Financial ServicesInnovation in the cloud - Reducing IP risk for Financial Services
Innovation in the cloud - Reducing IP risk for Financial Services
Aistemos
 
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Praveen Velichety
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
Giulio Coraggio
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
Frederike Kaltheuner
 
AllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation CenterAllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation Center
Stefaan Top
 
Insurtech Sydney Launch Event 7 September 2016
Insurtech Sydney Launch Event 7 September 2016Insurtech Sydney Launch Event 7 September 2016
Insurtech Sydney Launch Event 7 September 2016
Brenton Charnley
 
[infographic] e-signatures in Australia
[infographic] e-signatures in Australia[infographic] e-signatures in Australia
[infographic] e-signatures in Australia
eSignLive by VASCO
 
[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018
Somo
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
Alexandra Deschamps-Sonsino
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
Harry Gunns
 
Privacy in an interconnected world
Privacy in an interconnected worldPrivacy in an interconnected world
Privacy in an interconnected world
Bianca Mueller, LL.M.
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities
4 All of Us
 

What's hot (18)

Network-Powered Wi-Fi Analytics
Network-Powered Wi-Fi AnalyticsNetwork-Powered Wi-Fi Analytics
Network-Powered Wi-Fi Analytics
 
Mobility and BYOD
Mobility and BYODMobility and BYOD
Mobility and BYOD
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...Alex Zdrilko - АI and Blockchain in real life application with the highest se...
Alex Zdrilko - АI and Blockchain in real life application with the highest se...
 
Remote facility monitoring and control using IoT
Remote facility monitoring and control using IoTRemote facility monitoring and control using IoT
Remote facility monitoring and control using IoT
 
Insurance IoT Digital Report
Insurance IoT Digital ReportInsurance IoT Digital Report
Insurance IoT Digital Report
 
Innovation in the cloud - Reducing IP risk for Financial Services
Innovation in the cloud - Reducing IP risk for Financial ServicesInnovation in the cloud - Reducing IP risk for Financial Services
Innovation in the cloud - Reducing IP risk for Financial Services
 
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017Living In a World of Data Exploitation - CPDP 2017
Living In a World of Data Exploitation - CPDP 2017
 
AllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation CenterAllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation Center
 
Insurtech Sydney Launch Event 7 September 2016
Insurtech Sydney Launch Event 7 September 2016Insurtech Sydney Launch Event 7 September 2016
Insurtech Sydney Launch Event 7 September 2016
 
[infographic] e-signatures in Australia
[infographic] e-signatures in Australia[infographic] e-signatures in Australia
[infographic] e-signatures in Australia
 
[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018[Webinar] The impact of innovation and technology for businesses in 2018
[Webinar] The impact of innovation and technology for businesses in 2018
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
Privacy in an interconnected world
Privacy in an interconnected worldPrivacy in an interconnected world
Privacy in an interconnected world
 
Smart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure CitiesSmart Cities Day 1 Secure Cities
Smart Cities Day 1 Secure Cities
 

Viewers also liked

Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
DeServ - Tecnologia e Servços
 
El zorro zorro de arriba y el zorro de abajo
El zorro zorro de arriba y el zorro de abajo El zorro zorro de arriba y el zorro de abajo
El zorro zorro de arriba y el zorro de abajo
jeremycorrea18
 
айжан кожанова+брендовый магазин+клиенты
айжан кожанова+брендовый магазин+клиентыайжан кожанова+брендовый магазин+клиенты
айжан кожанова+брендовый магазин+клиенты
айжан кожанова
 
Phrasal verbs
Phrasal verbsPhrasal verbs
Phrasal verbs
vivanareyesc
 
Historia
HistoriaHistoria
Historia
vitor hugo
 
"Blog" para TIC´s
"Blog" para TIC´s"Blog" para TIC´s
"Blog" para TIC´s
Valeria Arias
 
Tecnologia educativa
Tecnologia educativaTecnologia educativa
Tecnologia educativa
yohaneth delgado
 
ceremonies for teenagers to become adults
ceremonies for teenagers to become adultsceremonies for teenagers to become adults
ceremonies for teenagers to become adults
gabrielescobar25
 

Viewers also liked (10)

Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
El zorro zorro de arriba y el zorro de abajo
El zorro zorro de arriba y el zorro de abajo El zorro zorro de arriba y el zorro de abajo
El zorro zorro de arriba y el zorro de abajo
 
Madon CV shl2
Madon CV shl2Madon CV shl2
Madon CV shl2
 
KStevensonGNINuclearPower
KStevensonGNINuclearPowerKStevensonGNINuclearPower
KStevensonGNINuclearPower
 
айжан кожанова+брендовый магазин+клиенты
айжан кожанова+брендовый магазин+клиентыайжан кожанова+брендовый магазин+клиенты
айжан кожанова+брендовый магазин+клиенты
 
Phrasal verbs
Phrasal verbsPhrasal verbs
Phrasal verbs
 
Historia
HistoriaHistoria
Historia
 
"Blog" para TIC´s
"Blog" para TIC´s"Blog" para TIC´s
"Blog" para TIC´s
 
Tecnologia educativa
Tecnologia educativaTecnologia educativa
Tecnologia educativa
 
ceremonies for teenagers to become adults
ceremonies for teenagers to become adultsceremonies for teenagers to become adults
ceremonies for teenagers to become adults
 

Similar to Will Your Business Get Hacked - Hull (Apr 28)

Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes GoldieWill Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
HBP Systems Ltd
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast Briefing
PKF Francis Clark
 
IBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day Keynote
IBM Software India
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
Jean-Michel Franco
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
SPMTPCAMPUS
 
The Next BIG Thing in SCM - AI @ CSCMP Barcelona
The Next BIG Thing in SCM - AI @ CSCMP BarcelonaThe Next BIG Thing in SCM - AI @ CSCMP Barcelona
The Next BIG Thing in SCM - AI @ CSCMP Barcelona
Thorsten Schroeer
 
Digital Europe: Pushing the frontier, capturing the benefits
Digital Europe: Pushing the frontier, capturing the benefitsDigital Europe: Pushing the frontier, capturing the benefits
Digital Europe: Pushing the frontier, capturing the benefits
McKinsey & Company
 
Big Data, Big Deal
Big Data,  Big DealBig Data,  Big Deal
Big Data, Big Deal
Piyush Malik
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
SPMTPCAMPUS
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
Gloucestershire Professionals
 
Towards a Smarter Data Driven Future
Towards a Smarter Data Driven FutureTowards a Smarter Data Driven Future
Towards a Smarter Data Driven Future
Piyush Malik
 
Smarter analytics101 v2.0.1
Smarter analytics101 v2.0.1Smarter analytics101 v2.0.1
Smarter analytics101 v2.0.1Jenawahl
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
Data Driven Innovation
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Making Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponMaking Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive Weapon
SCL HUB
 
Making Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponMaking Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive Weapon
SCL HUB Conference
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
Perry Lea
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
PREMTRIVEDI5
 

Similar to Will Your Business Get Hacked - Hull (Apr 28) (20)

Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes GoldieWill Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast Briefing
 
IBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day Keynote
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
The Next BIG Thing in SCM - AI @ CSCMP Barcelona
The Next BIG Thing in SCM - AI @ CSCMP BarcelonaThe Next BIG Thing in SCM - AI @ CSCMP Barcelona
The Next BIG Thing in SCM - AI @ CSCMP Barcelona
 
Digital Europe: Pushing the frontier, capturing the benefits
Digital Europe: Pushing the frontier, capturing the benefitsDigital Europe: Pushing the frontier, capturing the benefits
Digital Europe: Pushing the frontier, capturing the benefits
 
Big Data, Big Deal
Big Data,  Big DealBig Data,  Big Deal
Big Data, Big Deal
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Towards a Smarter Data Driven Future
Towards a Smarter Data Driven FutureTowards a Smarter Data Driven Future
Towards a Smarter Data Driven Future
 
Smarter analytics101 v2.0.1
Smarter analytics101 v2.0.1Smarter analytics101 v2.0.1
Smarter analytics101 v2.0.1
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Making Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponMaking Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive Weapon
 
Making Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive WeaponMaking Supply Chain Your Competitive Weapon
Making Supply Chain Your Competitive Weapon
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Will Your Business Get Hacked - Hull (Apr 28)

  • 1. 1
  • 2. 2 James Burchell Senior Sales Engineer Will your business get hacked?
  • 3. 3 Large Companies 81% £600k - £1.5m Small Companies 60% £65k - £115k Large Companies 90% £1.46m - £3.14m Small Companies 75% £75k - £311k
  • 4. 4 2016: The year of the bigger problems?
  • 6. 6 4,000 data breaches in 3 years Computing.co.uk Over 170 law firms investigated in 1 year Computing.co.uk All major UK banks and lenders reported data breaches Computing.co.uk ¾ of customers would reconsider using a company Computing.co.uk Who’s to blame?
  • 7. 7 Nearly 300,000 customers lost Computing.co.uk 159,959 accounts compromised Computing.co.uk Total cost £40- £45 million Computing.co.uk £15 million lost in trading value Computing.co.uk BT picked up 40% of unhappy customers Computing.co.uk
  • 8. 8 Spending on IT Security and Documenting Security Policies Is Increasing …Is the TOP Priority For CIOs… Top 3 priorities Modernization innovation #2 Cloud mobility #3 Information Security Is a Priority For Top Management… Cyber security / IT security #1 …Increasing the Spend On Security Projects in All Categories YoY increase in spend in external IT projects Spending growth expectations in January 2015 Source: PWC Source: Morgan Stanley research Responses to rising risks 2014 2015 Source: Grant Thornton survey Note: 1. Large organizations and small businesses consist of enterprises with >250 employees and <50 employees respectively, priority levels for medium sized businesses (50-249 employees) are similar to those for small businesses (1) (1)
  • 9. 9
  • 10. 10 Complexity nightmare of Endpoint and Network Security Analytics • Multiple incompatible interfaces • Resource intensive • Manual integration • Dependent upon human analysis • Manual Threat/Incident response • Extra products that are unaware of each other • Manual correlation • Support nightmare Traditional firewall Email gateway Web gateway NG Firewall Sandbox Network Behaviour Analytics SIEM Traditional anti-malware Encryption Web, Device and App Control “Next Generation” Detection “Next Generation” Remediation “Next Generation” Prevention
  • 11. 11 5.5 million things connected every day 1 20 15 10 5 Billions 2001 20202014 1.2B 20.8B 6.4B 2016
  • 15. 15 “For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe.” Tim Cook, CEO of Apple
  • 16. 16 Up to 35% would Sell company information Computing.co.uk
  • 17. 17 Passwords… 1. 123456 2. password 3. 12345678 4. qwerty 5. 12345 6. 123456789 7. football 8. 1234 9. 1234567 10. baseball 11. welcome 12. 1234567890 13. abc123 14. 111111 15. 1qaz2wzx 16. dragon 17. master 18. monkey 19. letmein 20. login
  • 18. 18 “Two things are infinite: The universe and human stupidity, and I’m not so sure about the former.” - Albert Einstein
  • 21. 21 Firewall Web Email Wireless Reducing the threat - Protect Endpoint Encryption Server Mobile Insight & Analysis Better Protection Intelligence Sharing 21
  • 23. 23 Reducing the threat - Educate Passphrases not passwords Think before you click Verify the call
  • 24. 24 Layered defense & automation Analytics Next-Gen Firewall Wireless Web Email Disk Encryption UTM File Encryption Endpoint Next-Gen Endpoint Mobile Server Cloud Intelligence Centralized Policy Management
  • 25. 25© Sophos Ltd. All rights reserved.