Presentation on how to chat with PDF using ChatGPT code interpreter
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
1.
2. “Data Security Solutions” business card
Specialization – IT Security
IT Security services (consulting,
audit, pen-testing, market analysis,
system testing and integration,
training and technical support)
Solutions
and
experience
portfolio with more than 20
different technologies - global
market leaders
Trusted services provider for
banks,
insurance
companies,
government
and
private
companies (critical infrastructure
etc.)
3. Agenda
Where are we now – technology perspective
Cyber security reality check
The challenge and the solution
Questions & Answers
9. CEO
CFO/COO
Loss of market
share and
reputation
Legal exposure
Audit failure
Fines and criminal
charges
Financial loss
CIO
Loss of data
confidentiality,
integrity and/or
availability
CHRO
Violation of
employee privacy
CMO
Loss of customer
trust
Loss of brand
reputation
Increasingly, companies are appointing CROs and CISOs
with a direct line to the Audit Committee
Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series
10. Agenda cont.
Where are we now – technology perspective
Cyber security reality check
The challenge and the solution
Questions & Answers
15. Video consumption on mobile devices in Europe has
climbed by 112% in the last 12 months. This is yet another
indication of the video-powered mobile web era on our
doorstep.
(Source: comScore)
16.
17.
18.
19.
20. Businesses now spend 24% of marketing budgets on paid
search. And, 41% of people are unaware they a clicking on
PPC links, believing they are organic results.
(Source: Econsultancy)
21. LinkedIn is nearly three times as effective for lead
generation as Twitter and Facebook. And two new users
join LinkedIn every second.
(Source: Topdogsocialmedia.com)
(image via australiance.com)
22. Google.com processes 12.9 billion searches per month. Of
that, 1.17 billion searches are by unique users.
(Source: ExpandedRamblings.com)
23. IT in business is becomming more and
more important (ERP, CRM, document
management systems, digital prototypes,
BI, MIS etc.)
E-World for business is developing (eHealth, e-Services, e-Government, video
conferencing, web-conferencing utt.)
Mobility makes borderless enterprises
reality
Cyber culture develops faster than cyber
security for many years already!
24. Agenda cont.
Where are we now – technology perspective
Cyber security reality check
The challenge and the solution
Questions & Answers
25.
26.
27.
28. Mobile Malware
Explodes
McAfee 2013 Q1 Threats Report
Mobile banking
adoption rising
Federal Reserve Survey March 2013
End users fall victim
to mobile attacks
29.
30.
31. Current prices on the Russian underground market:
Hacking corporate mailbox: $500
Winlocker ransomware: $10-$20
Unintelligent exploit bundle: $25
Intelligent exploit bundle: $10-$3,000
Basic crypter (for inserting rogue code into benign file): $10-$30
SOCKS bot (to get around firewalls): $100
Hiring a DDoS attack: $30-$70 / day, $1,200 / month
Botnet: $200 for 2,000 bots
DDoS Botnet: $700
ZeuS source code: $200-$250
Windows rootkit (for installing malicious drivers): $292
Hacking Facebook or Twitter account: $130
Hacking Gmail account: $162
Email spam: $10 per one million emails
Email scam (using customer database): $50-$500 per one million emails
32.
33.
34. Motive
1995 – 2005
1st Decade of the
Commercial Internet
2005 – 2015
2nd Decade of the
Commercial Internet
National Security
Infrastructure Attack
Espionage
Political Activism
Monetary Gain
Revenge
Curiosity
Competitors, hacktivists
Organized crime
Insiders
Script-kiddies or hackers
35. Agenda cont.
Where are we now – technology perspective
Cyber security reality check
The challenge and the solution
Questions & Answers
36. For many companies security is like salt, people just
sprinkle it on top.
37.
38.
39. Secure own mobile application development
Static code testing
Dynamic code testing
BYOD (Bring Your Own Device) policy:
Mobile Device Management
Mobile Application Management
Mobile Content Management (DLP)
Data control and data separation
Private data
Corporate data
Secure Access & Strong IT Security policy
Secure Connection (encrypted)
Identity control, Authentification &
Authorization management
40. Policy and real time control
Of devices and applications
Of people and IT stuff
Of data leak protection
Of internet usage
Of remote access
Of employees training
Of….
Encryption of..
Mobile phones
Voice calls and text messages
eMails
Computers and devices
Data bases
…
41.
42. Continuous
vulnerability
and
assessment with board’s involvment
risk
Training and continuous awareness
raising for IT specialists and non-IT
specialists / employees
Best price / performance defense
technologies to implement and maintain
Trusted IT specialists to help to protect
your business plans
Be ready to invest because there is no
other choice!