advertisement

DSS @RIGA COMM2013 - The Value of an IT Security for Business People

50 %
50 %
advertisement
Information about DSS @RIGA COMM2013 - The Value of an IT Security for Business People
Technology

Published on November 22, 2013

Author: AndSor

Source: slideshare.net

Description

Presentation from annual IT and Telcom conference "Riga Comm2013", where DSS took part.
advertisement

“Data Security Solutions” business card Specialization – IT Security IT Security services (consulting, audit, pen-testing, market analysis, system testing and integration, training and technical support) Solutions and experience portfolio with more than 20 different technologies - global market leaders Trusted services provider for banks, insurance companies, government and private companies (critical infrastructure etc.)

Agenda Where are we now – technology perspective Cyber security reality check The challenge and the solution Questions & Answers

Productivity Security

Costs New optimum? Risks Optimum? Security costs Remaining part of risk DROŠĪBAS PASĀKUMI Security actions Source: Māris Gabaliņš, The Art Of The Systems

CEO CFO/COO Loss of market share and reputation Legal exposure Audit failure Fines and criminal charges Financial loss CIO Loss of data confidentiality, integrity and/or availability CHRO Violation of employee privacy CMO Loss of customer trust Loss of brand reputation Increasingly, companies are appointing CROs and CISOs with a direct line to the Audit Committee Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series

Agenda cont. Where are we now – technology perspective Cyber security reality check The challenge and the solution Questions & Answers

PC era Mobile era

Video consumption on mobile devices in Europe has climbed by 112% in the last 12 months. This is yet another indication of the video-powered mobile web era on our doorstep. (Source: comScore)

Businesses now spend 24% of marketing budgets on paid search. And, 41% of people are unaware they a clicking on PPC links, believing they are organic results. (Source: Econsultancy)

LinkedIn is nearly three times as effective for lead generation as Twitter and Facebook. And two new users join LinkedIn every second. (Source: Topdogsocialmedia.com) (image via australiance.com)

Google.com processes 12.9 billion searches per month. Of that, 1.17 billion searches are by unique users. (Source: ExpandedRamblings.com)

IT in business is becomming more and more important (ERP, CRM, document management systems, digital prototypes, BI, MIS etc.) E-World for business is developing (eHealth, e-Services, e-Government, video conferencing, web-conferencing utt.) Mobility makes borderless enterprises reality Cyber culture develops faster than cyber security for many years already!

Agenda cont. Where are we now – technology perspective Cyber security reality check The challenge and the solution Questions & Answers

Mobile Malware Explodes McAfee 2013 Q1 Threats Report Mobile banking adoption rising Federal Reserve Survey March 2013 End users fall victim to mobile attacks

Current prices on the Russian underground market: Hacking corporate mailbox: $500 Winlocker ransomware: $10-$20 Unintelligent exploit bundle: $25 Intelligent exploit bundle: $10-$3,000 Basic crypter (for inserting rogue code into benign file): $10-$30 SOCKS bot (to get around firewalls): $100 Hiring a DDoS attack: $30-$70 / day, $1,200 / month Botnet: $200 for 2,000 bots DDoS Botnet: $700 ZeuS source code: $200-$250 Windows rootkit (for installing malicious drivers): $292 Hacking Facebook or Twitter account: $130 Hacking Gmail account: $162 Email spam: $10 per one million emails Email scam (using customer database): $50-$500 per one million emails

Motive 1995 – 2005 1st Decade of the Commercial Internet 2005 – 2015 2nd Decade of the Commercial Internet National Security Infrastructure Attack Espionage Political Activism Monetary Gain Revenge Curiosity Competitors, hacktivists Organized crime Insiders Script-kiddies or hackers

Agenda cont. Where are we now – technology perspective Cyber security reality check The challenge and the solution Questions & Answers

For many companies security is like salt, people just sprinkle it on top.

Secure own mobile application development Static code testing Dynamic code testing BYOD (Bring Your Own Device) policy: Mobile Device Management Mobile Application Management Mobile Content Management (DLP) Data control and data separation Private data Corporate data Secure Access & Strong IT Security policy Secure Connection (encrypted) Identity control, Authentification & Authorization management

Policy and real time control Of devices and applications Of people and IT stuff Of data leak protection Of internet usage Of remote access Of employees training Of…. Encryption of.. Mobile phones Voice calls and text messages eMails Computers and devices Data bases …

Continuous vulnerability and assessment with board’s involvment risk Training and continuous awareness raising for IT specialists and non-IT specialists / employees Best price / performance defense technologies to implement and maintain Trusted IT specialists to help to protect your business plans Be ready to invest because there is no other choice!

www.dss.lv andris@dss.lv +371 29162784

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

A Practical Guide to the Payment Card Industry Data ...

Benchmarking and Business Value Assessment of COBIT 5. ... A Practical Guide to the Payment Card Industry Data Security Standard (PCI DSS) ...
Read more

What is decision support system (DSS)? - Definition from ...

A decision support system (DSS) ... IT/business mgmt; Security and risk mgmt; ... Your organization has a bunch of people who want to develop a mobility ...
Read more

An Introduction to the Business Model for Information Security

Benchmarking and Business Value ... Industry Data Security Standard (PCI DSS) ... The Business Model for Information Security does not replace the ...
Read more

Payment Card Industry (PCI) Data Security Standard (DSS ...

and Payment Application Data Security Standard ... The people, processes and ... organization or business which is undergoing a PCI DSS review.
Read more

DSS: Protection - South Carolina Department of Social Services

The OHAN Unit also receives reports of abuse or neglect in foster homes but the County DSS offices not ... local DSS office during normal business ...
Read more

Security Audit, Compliance and Standards resources and ...

Security Audit, Compliance and Standards Get Started. ... including the value it provides security ... Microsoft will lay off 18,000 people over the next ...
Read more

DSS / Industrial Security

Doing Business with DSS; Frequently Asked Questions; Directorates. Industrial Security (IS) Counterintelligence (CI) ... Home + Industrial Security.
Read more

What Are We Protecting? - Defense Security Service (DSS)

Doing Business with DSS; Frequently Asked Questions; ... corporate official or security officer ... People. Government personnel;
Read more