SlideShare a Scribd company logo
ENTERPRISE CYBERSECURITY
“1 in 6 [of web-based applications] is a malware-related app. Imagine that from
the time of floppy disk drives where there would be 15 viruses a month, there
is now millions of malware being discovered on a daily basis.”
– Bill Chang, CEO of Group Enterprise, SingTel
“ENTERPRISE CYBERSECURITY”
Presented by:
Gerry Poe, CEO and Founder
In 2015 alone, hackers stole the records of
- 11 million people from Premiere Blue Cross
- 10 million people from Excellus BlueCross BlueShield
- 80 million people from Anthem
In contrast, only 22 million people
were directly affected by the
hackers who stole information from
the Office of Personnel
Management.
> Ransomware
> The Internet of Things
> Cyber-espionage
> Cyber theft increases
> Insecure Passwords
WHICH KINDS OF APPLICATIONS ARE
CAUSING THE MOST PROBLEMS?
Download free report on TruShield’s website at:
http://info.trushieldinc.com/2015-annual-cyber-threat-intelligence-report
“Brokers and clients have told us they want an end to unclear and
opaque language, as well as less promotion of off-the-shelf cyber
products by insurers and more joined-up risk management
solutions.”
- Tim Stapleton
Vice President and Cyber Insurance Product Manager, Overseas General Insurance at Chubb
When asked how many staff had completed their information security awareness
program, respondents in a quarter of organizations said that no more than 50% of staff
had done so.
Microsoft Active
Directory is the
foundation of cyber
85% of business and
government
worldwide, as well as
of privileged access
worldwide.
Taken together, the weaknesses
"could potentially compromise the
confidentiality, integrity, and
availability of HHS’ sensitive
information and information
systems," the report warned.
Businesses are constantly under “cyber attack. With the attack surface dramatically increased and a
mature attackers ecosystem, companies have to be ever more vigilant across all their IT assets"
- said Chan.
“Companies are trying to ensure business-as-usual systems are secure and effective
as well as working to drive change through the introduction of new technologies,
greater digitization and mobilization of internal and customer-facing systems.”
- Mark Peters, Managing Director, Protiviti
“Cyber security has
become a C-level issue,”
said Peter Swire, a
professor at Georgia
Tech, who advised
President Barack Obama
on US cyber security
strategy.
“In 2016, we expect boards, audit
committees, executives and
public officials to ask more
pointed questions to ascertain
whether their organization is in a
defensible position”
- KPMG concluded.
The bank is the largest in
Japan, where it faces more
than 80 percent of all cyber
attacks, but also provides
corporate banking services
in the UK.
1) Developing cyberspace capabilities
2) Defending the DOD information network
3) Securing DOD data, and mitigating cyber risks
to DOD missions
4) Preparing to defend U.S. interests from major
cyber attacks
5) Developing cyber options to control cyber
warfare
6) Building international alliances to deter shared
global cyber threats.
Military cyber planning has six goals:
Cyber-security consulting
costs are around $16.5
billion per annum at present,
and are expected to grow to
$23 billion annually by 2019.
As attacks on industrial control
systems (ICSs) become more
frequent and increasingly
sophisticated, defensive strategies
must evolve to keep up.
Fortunately, the tools are getting
better.
Cyber security in process plants:
Recognizing risks, addressing current threats
By leveraging cyber risk management solutions, organizations can significantly
shorten time-to-remediation, increase operational efficiency, strengthen their
security posture, enforce cyber hygiene, improve response readiness, reduce
costs, and ultimately minimize cyber risks.
1) Assume that hackers will ultimately penetrate your infrastructure.
2) Deception can be a useful component of a security strategy.
3) Cyberterrorism has begun.
4) Nearly everyone relies on information-security of 3rd parties for mission critical tasks.
5) Humans are often the weakest point in the security chain.
6) Emerging technologies are obviously great targets.
Six Emerging Cybersecurity Risks You Should Be Aware Of
“The small businesses, I
think, are much more at
risk than they realize,”
- Lisa Traina, CPA/CITP, CGMA,
President of Traina & Associates in
Louisiana.
"Protecting our industry from cyber threats is hard, probably one of the hardest things
we are facing because we do not know what we are facing or for what we have to
prepare“
- Jeff Poole,
Director General of the Civil Air Navigation Services Organization (CANSO)
Dan Trueman, head of cyber for Novae said that the size of broking and
underwriting teams for cyber has not kept pace with the growth of the
market for the risk.
Many SMBs don’t have the time, staff, expertise, or IT resources
to ensure that their businesses are protected, and F-Secure
states, as a result, SMBs face several cybersecurity
vulnerabilities.
“You don’t need autonomous cars to be hacked”
- Alexander Moiseev, Kaspersky’s Managing Director of Europe
A six life cycle program
“Honeywell addresses end-to-end Industrial Cyber
around people, process and technology into a six life
which needs to be continuously initiated” - Akhtar.
1. The Hyper Click
2. The Slick Willie
3. The Boss Hogg
… and so on..
Cyber crime is real. It’s a daily occurrence; behind the scenes and in the
security equipment of every computer network.
Consistent, reliable cyber measures are a necessary mainstay of today’s
business operations.
Summary:
New technologies in service, help support
business-as-usual.
MAKING YOUR BUSINESS TECHNOLOGIES SIMPLY BRILLIANT!
Since 1987, Santa Clarita Consultants, a leading enterprise
provider, delivers business solutions to mid-market
- GERRY POE –
GPoe@scc-co.com
M: 661.645.5825

More Related Content

Enterprise Cyber Security 2016

  • 1. ENTERPRISE CYBERSECURITY “1 in 6 [of web-based applications] is a malware-related app. Imagine that from the time of floppy disk drives where there would be 15 viruses a month, there is now millions of malware being discovered on a daily basis.” – Bill Chang, CEO of Group Enterprise, SingTel
  • 3. In 2015 alone, hackers stole the records of - 11 million people from Premiere Blue Cross - 10 million people from Excellus BlueCross BlueShield - 80 million people from Anthem In contrast, only 22 million people were directly affected by the hackers who stole information from the Office of Personnel Management.
  • 4. > Ransomware > The Internet of Things > Cyber-espionage > Cyber theft increases > Insecure Passwords
  • 5. WHICH KINDS OF APPLICATIONS ARE CAUSING THE MOST PROBLEMS?
  • 6. Download free report on TruShield’s website at: http://info.trushieldinc.com/2015-annual-cyber-threat-intelligence-report
  • 7. “Brokers and clients have told us they want an end to unclear and opaque language, as well as less promotion of off-the-shelf cyber products by insurers and more joined-up risk management solutions.” - Tim Stapleton Vice President and Cyber Insurance Product Manager, Overseas General Insurance at Chubb
  • 8. When asked how many staff had completed their information security awareness program, respondents in a quarter of organizations said that no more than 50% of staff had done so.
  • 9. Microsoft Active Directory is the foundation of cyber 85% of business and government worldwide, as well as of privileged access worldwide.
  • 10. Taken together, the weaknesses "could potentially compromise the confidentiality, integrity, and availability of HHS’ sensitive information and information systems," the report warned.
  • 11. Businesses are constantly under “cyber attack. With the attack surface dramatically increased and a mature attackers ecosystem, companies have to be ever more vigilant across all their IT assets" - said Chan.
  • 12. “Companies are trying to ensure business-as-usual systems are secure and effective as well as working to drive change through the introduction of new technologies, greater digitization and mobilization of internal and customer-facing systems.” - Mark Peters, Managing Director, Protiviti
  • 13. “Cyber security has become a C-level issue,” said Peter Swire, a professor at Georgia Tech, who advised President Barack Obama on US cyber security strategy.
  • 14. “In 2016, we expect boards, audit committees, executives and public officials to ask more pointed questions to ascertain whether their organization is in a defensible position” - KPMG concluded.
  • 15. The bank is the largest in Japan, where it faces more than 80 percent of all cyber attacks, but also provides corporate banking services in the UK.
  • 16. 1) Developing cyberspace capabilities 2) Defending the DOD information network 3) Securing DOD data, and mitigating cyber risks to DOD missions 4) Preparing to defend U.S. interests from major cyber attacks 5) Developing cyber options to control cyber warfare 6) Building international alliances to deter shared global cyber threats. Military cyber planning has six goals:
  • 17. Cyber-security consulting costs are around $16.5 billion per annum at present, and are expected to grow to $23 billion annually by 2019.
  • 18. As attacks on industrial control systems (ICSs) become more frequent and increasingly sophisticated, defensive strategies must evolve to keep up. Fortunately, the tools are getting better. Cyber security in process plants: Recognizing risks, addressing current threats
  • 19. By leveraging cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security posture, enforce cyber hygiene, improve response readiness, reduce costs, and ultimately minimize cyber risks.
  • 20. 1) Assume that hackers will ultimately penetrate your infrastructure. 2) Deception can be a useful component of a security strategy. 3) Cyberterrorism has begun. 4) Nearly everyone relies on information-security of 3rd parties for mission critical tasks. 5) Humans are often the weakest point in the security chain. 6) Emerging technologies are obviously great targets. Six Emerging Cybersecurity Risks You Should Be Aware Of
  • 21. “The small businesses, I think, are much more at risk than they realize,” - Lisa Traina, CPA/CITP, CGMA, President of Traina & Associates in Louisiana.
  • 22. "Protecting our industry from cyber threats is hard, probably one of the hardest things we are facing because we do not know what we are facing or for what we have to prepare“ - Jeff Poole, Director General of the Civil Air Navigation Services Organization (CANSO)
  • 23. Dan Trueman, head of cyber for Novae said that the size of broking and underwriting teams for cyber has not kept pace with the growth of the market for the risk.
  • 24. Many SMBs don’t have the time, staff, expertise, or IT resources to ensure that their businesses are protected, and F-Secure states, as a result, SMBs face several cybersecurity vulnerabilities.
  • 25. “You don’t need autonomous cars to be hacked” - Alexander Moiseev, Kaspersky’s Managing Director of Europe
  • 26. A six life cycle program “Honeywell addresses end-to-end Industrial Cyber around people, process and technology into a six life which needs to be continuously initiated” - Akhtar.
  • 27. 1. The Hyper Click 2. The Slick Willie 3. The Boss Hogg … and so on..
  • 28. Cyber crime is real. It’s a daily occurrence; behind the scenes and in the security equipment of every computer network. Consistent, reliable cyber measures are a necessary mainstay of today’s business operations. Summary: New technologies in service, help support business-as-usual.
  • 29. MAKING YOUR BUSINESS TECHNOLOGIES SIMPLY BRILLIANT! Since 1987, Santa Clarita Consultants, a leading enterprise provider, delivers business solutions to mid-market - GERRY POE – GPoe@scc-co.com M: 661.645.5825