SlideShare une entreprise Scribd logo
1  sur  40
Security Intelligence
for business data and
IS protection
Andris Soroka
10.11.2015, Vilnius
Riga, Latvia
“Data Security Solutions” business cardWhat We Do?
DSS
Cyber
Security
Only
Full IT
Security
Services
Lifecycle
Most
Innovative
Portfolio in
Baltics
Member–
ships,
Awareness
Rising
Technology
&
Knowledge
Transfer
ICT
Security
Evangelists
Endpoints
Applications
Networks
Data
Identity
Mobility
Management
Cloud
DSS Global Partnerships
DSS Delivering Excellent ICT Security Operatitions to
its Customers
Customer ICT
Security
Operations
Excellence
Cooperation with
Industry Top
Technology
Leaders
Recognised by
Gartner, IDC,
Forester
Top level ICT
Security
Professionals
Selected
Cutting Edge
ICT Security
Innovative
Technology
Integration
Pan-
Baltic
Projects
Particular
Focus on
Security
Our international cyber security conference
6th annual since 2010
70+ presentations
8 parallel sessions
700 on-site visitors
2500 online watchers
http://event.dss.lv
Remarks from Cybersecurity Month - October
Future is now. We live in future.
3D Printers (Terminator 2 style)
Google Glasses (..and “glassh**es)
Cloud Computing
Big Data & Supercomputers (quantum)
Mobile Payment & Virtual Money
eCasino’s, eBetting, eShops, eAnything
Robotics and Intraday Deliveries
Internet of things & smart cities
Augmented Reality
Extreme development of App’s
Digital prototyping
Gadgets (devices) & Mobility
Technology replaced jobs (automation)
Geo-location power
Biometrics
Health bands and mHealth
Electronic cars
Avegant Glymph and much, much more
Opportunity every business should see and seek
Trends of the digital future
Cyber security future is now ..
The Raise of Threats and Attacks
Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2015
Attack types
2012
40% increase
2013
800,000,000+ records
2014
Unprecedented impact
XSS SQLiMisconfig. Watering
Hole
Brute
Force
Physical
Access
Heartbleed Phishing DDoS Malware Undisclosed
$6.5M
average cost of a U.S. data breachaverage time to detect APTs
256days
Source: 2015 Cost of Data Breach Study, Ponemon Institute
Sophisticated attacks of today’s cybercrime
Targeted professional attacks
Massive Denials of Services
Watering hole attacks
Advanced persistent threats
Mobile incidents
Cyber wars
Hacktivists
Global virus outbreaks
Shadow IT and dark net
Insane data leakages
Identity thefts
Cyber espionage
And so on...
“You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to
believe. You take the red pill, you stay in wonderland, and I show you how deep the rabbit hole
goes.”
~Morpheus @Matrix
Rabbit hole versus wonderland...
Blue pill option e.g. «wonderland»
Don’t invest now
Believe in security of Your data&IS’s
Ignore it all despite reality to
contrary that every business is
affected
Red pill «rabbit hole»
Stop functioning under illusion of
security
Implement effective and innovative
security technologies
Learn how deep rabbit hole goes...
Impact of Cyber Security Risks to «C’s»
Loss of market share
and reputation
Legal exposure
Business continuity
Audit failure
Fines and
enforcement impact
Financial loss
Impact to data and
systems,
(confidentiality,
integrity and /
or availability)
Violation of
employee
privacy
Loss of
sensitive data
Loss of
customer
trust
Loss of
brand reputation
CEO / COO CCO / CFO CIO CHRO / CDO CMO
Your board and CEO demand a strategy
Political (external and internal)
Technological (risks, threats, fraud, attacks, leaks)
Economical (budget reality, competition, costs…)
Legal (compliances, regulations etc.)
Professional (HR, information quantity)
Psychological ( traditions / knowledge / trust)
Challenges of CIO’s & CSO’s
Security myth #2 – old security works well
Compliant and secure are two different things....
Compliance does great job to help elevate
awareness of security concerns
And also help to enforce minimum baseline
standards
However checking right boxes to get through
every next audit leaves organization exposed to
any new technologically advanced threat,
sophisticated targeted attack and so on
If organization has automated risk
management (GRC) solution in place that’s also
significantly better than a manual teamwork
(XLS’s)
Cyber Criminals Also Use BI or MIS Dashboards
Every example in main stream movies now
Summary before «silver bullet»
Cybercrime is real deal, everyone is affected and it is
next door if haven’t been knocking at Yours already yet
– and you do not want to get famous...
All traditional securities invented decades ago aren’t
any more efficient, as well all compliances, regulas and
security standards without innovative technologies and
investment in cyber security always remain one step
behind bad guys
World is short on enough smart good guys that know
both – business and IT security – and can translate IT
into business language and manage the risks with
ellegance
Don’t take blue pill – that might cost lot more later
How to establish security as imune system?
Security Intelligence & Integration is
mandatory
HR training / awareness raising (corporate
cyber security driver’s license)
Compliance and risk management
Cyber Security as business enabler
Business part
Business processes analysis from tech perspective
Assessment and management of cyber security risks
Related technological part
Inventory of devices and software
Secure configuration of everything (end-users, devices)
Vulnerability assessment and management
Malware defenses, application security, pen tests
Wifi security
Mobile security
Data security
Continuos skills training and learning
Access control and visibility
Audit, monitoring, analysis, incident response and more
Business & technology common risk language
Complexity of security challenges
Prevent. Detect. Respond.
Log
Manageme
nt
Security
Intelligence
Network
Activity
Monitoring
Risk
Manageme
nt
Vulnerabili
ty
Manageme
nt
Network
Forensics
Suspected
Incidents
Prioritized Incidents
Servers and mainframes
Data activity
Network and virtual activity
Application activity
Configuration information
Security devices
Users and identities
Vulnerabilities and threats
Global threat intelligence
Extensive Data Sources
Automated
Offense
Identification
•Massive data reduction (millions to one)
•Automated data collection,
asset discovery and profiling
•Automated, real-time,
and integrated analytics
•Activity baselining
and anomaly detection
•Out-of-the box rules
and templates
Embedded
Intelligence
Security intelligence for automated offense detection
Our proposal with Security Intelligence & Integration
Advantages and immediate gains
Intelligence & Visibility (real time risk
identification and management, continous
automated audit, forensics, increased quality
of services, alerts, privilleged users control,
real time topology&inventory etc.)
Centralized intelligent storage (of
business, user, IT event data for auditors,
reports, improved analysis of anything
Current and future costs saving
(technology and HR efficiency perspective)
If used now of in future as integrated
solution – the whole SOC (security
operations centre)
Integrated and Intelligent – IBM Security Systems
Our proposal with Security Intelligence & Integration
How we can help
Analyze and detect risks
Fulfill audit
Build security action plan
Train the employees
Pass compliance regulations
Save from data leakage
Protect critical assets
Get rid of passwords
Consult Your professionals
Protect from attacks
Help creating RFP docs
Be Your IT Security Advisor!
Business value of «Data Security Solutions»
Balancing costs and risk – floods happen..
Our vision and goal for our Customers!
Contact UsAndris Soroka
andris@dss.lv
Mob. +371 29162784
Riga, Latvia
www.dss.lv
LinkedIn: http://lv.linkedin.com/in/andsor
Twitter: @andris_soroka / @dss_it_security
Facebook: http://www.facebook.com/lvdss
Youtube: http://ow.ly/FAfEN
SlideShare: http://www.slideshare.net/andsor
Thank You
Merci
Grazie
Gracias
Obrigado
Danke
Japanese
English
French
Russian
GermanItalian
Spanish
Brazilian Portuguese
Arabic
Traditional Chinese
Simplified Chinese
Thai
Korean
Think Security First
Thank you

Contenu connexe

Tendances

Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 

Tendances (20)

security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
An Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTAn Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoT
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Iot and ethics
Iot and ethicsIot and ethics
Iot and ethics
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 

En vedette

Mars consultants presentation.ppt [compatibility mode]
Mars consultants presentation.ppt [compatibility mode]Mars consultants presentation.ppt [compatibility mode]
Mars consultants presentation.ppt [compatibility mode]
Mars Consultants
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
Uppala Anand
 

En vedette (15)

Mars consultants presentation.ppt [compatibility mode]
Mars consultants presentation.ppt [compatibility mode]Mars consultants presentation.ppt [compatibility mode]
Mars consultants presentation.ppt [compatibility mode]
 
Visual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security Intelligence
 
SplunkLive Melbourne Splunk for Operational Security Intelligence
SplunkLive Melbourne Splunk for Operational Security Intelligence SplunkLive Melbourne Splunk for Operational Security Intelligence
SplunkLive Melbourne Splunk for Operational Security Intelligence
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security Services
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 

Similaire à Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
ethnos
 

Similaire à Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November (20)

2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Main Menu
Main MenuMain Menu
Main Menu
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
A handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needsA handbook of the threat intelligence tools your company needs
A handbook of the threat intelligence tools your company needs
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Sophos
SophosSophos
Sophos
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptx
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 

Plus de Andris Soroka

Plus de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

  • 1. Security Intelligence for business data and IS protection Andris Soroka 10.11.2015, Vilnius Riga, Latvia
  • 2. “Data Security Solutions” business cardWhat We Do? DSS Cyber Security Only Full IT Security Services Lifecycle Most Innovative Portfolio in Baltics Member– ships, Awareness Rising Technology & Knowledge Transfer ICT Security Evangelists Endpoints Applications Networks Data Identity Mobility Management Cloud
  • 4. DSS Delivering Excellent ICT Security Operatitions to its Customers Customer ICT Security Operations Excellence Cooperation with Industry Top Technology Leaders Recognised by Gartner, IDC, Forester Top level ICT Security Professionals Selected Cutting Edge ICT Security Innovative Technology Integration Pan- Baltic Projects Particular Focus on Security
  • 5. Our international cyber security conference 6th annual since 2010 70+ presentations 8 parallel sessions 700 on-site visitors 2500 online watchers http://event.dss.lv
  • 6. Remarks from Cybersecurity Month - October
  • 7. Future is now. We live in future. 3D Printers (Terminator 2 style) Google Glasses (..and “glassh**es) Cloud Computing Big Data & Supercomputers (quantum) Mobile Payment & Virtual Money eCasino’s, eBetting, eShops, eAnything Robotics and Intraday Deliveries Internet of things & smart cities Augmented Reality Extreme development of App’s Digital prototyping Gadgets (devices) & Mobility Technology replaced jobs (automation) Geo-location power Biometrics Health bands and mHealth Electronic cars Avegant Glymph and much, much more
  • 8. Opportunity every business should see and seek
  • 9. Trends of the digital future
  • 11.
  • 12. The Raise of Threats and Attacks Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2015 Attack types 2012 40% increase 2013 800,000,000+ records 2014 Unprecedented impact XSS SQLiMisconfig. Watering Hole Brute Force Physical Access Heartbleed Phishing DDoS Malware Undisclosed $6.5M average cost of a U.S. data breachaverage time to detect APTs 256days Source: 2015 Cost of Data Breach Study, Ponemon Institute
  • 13. Sophisticated attacks of today’s cybercrime Targeted professional attacks Massive Denials of Services Watering hole attacks Advanced persistent threats Mobile incidents Cyber wars Hacktivists Global virus outbreaks Shadow IT and dark net Insane data leakages Identity thefts Cyber espionage And so on...
  • 14. “You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to believe. You take the red pill, you stay in wonderland, and I show you how deep the rabbit hole goes.” ~Morpheus @Matrix
  • 15. Rabbit hole versus wonderland... Blue pill option e.g. «wonderland» Don’t invest now Believe in security of Your data&IS’s Ignore it all despite reality to contrary that every business is affected Red pill «rabbit hole» Stop functioning under illusion of security Implement effective and innovative security technologies Learn how deep rabbit hole goes...
  • 16. Impact of Cyber Security Risks to «C’s» Loss of market share and reputation Legal exposure Business continuity Audit failure Fines and enforcement impact Financial loss Impact to data and systems, (confidentiality, integrity and / or availability) Violation of employee privacy Loss of sensitive data Loss of customer trust Loss of brand reputation CEO / COO CCO / CFO CIO CHRO / CDO CMO Your board and CEO demand a strategy
  • 17. Political (external and internal) Technological (risks, threats, fraud, attacks, leaks) Economical (budget reality, competition, costs…) Legal (compliances, regulations etc.) Professional (HR, information quantity) Psychological ( traditions / knowledge / trust) Challenges of CIO’s & CSO’s
  • 18.
  • 19. Security myth #2 – old security works well
  • 20. Compliant and secure are two different things.... Compliance does great job to help elevate awareness of security concerns And also help to enforce minimum baseline standards However checking right boxes to get through every next audit leaves organization exposed to any new technologically advanced threat, sophisticated targeted attack and so on If organization has automated risk management (GRC) solution in place that’s also significantly better than a manual teamwork (XLS’s)
  • 21.
  • 22. Cyber Criminals Also Use BI or MIS Dashboards
  • 23. Every example in main stream movies now
  • 24. Summary before «silver bullet» Cybercrime is real deal, everyone is affected and it is next door if haven’t been knocking at Yours already yet – and you do not want to get famous... All traditional securities invented decades ago aren’t any more efficient, as well all compliances, regulas and security standards without innovative technologies and investment in cyber security always remain one step behind bad guys World is short on enough smart good guys that know both – business and IT security – and can translate IT into business language and manage the risks with ellegance Don’t take blue pill – that might cost lot more later
  • 25. How to establish security as imune system? Security Intelligence & Integration is mandatory HR training / awareness raising (corporate cyber security driver’s license) Compliance and risk management Cyber Security as business enabler
  • 26. Business part Business processes analysis from tech perspective Assessment and management of cyber security risks Related technological part Inventory of devices and software Secure configuration of everything (end-users, devices) Vulnerability assessment and management Malware defenses, application security, pen tests Wifi security Mobile security Data security Continuos skills training and learning Access control and visibility Audit, monitoring, analysis, incident response and more Business & technology common risk language
  • 30. Suspected Incidents Prioritized Incidents Servers and mainframes Data activity Network and virtual activity Application activity Configuration information Security devices Users and identities Vulnerabilities and threats Global threat intelligence Extensive Data Sources Automated Offense Identification •Massive data reduction (millions to one) •Automated data collection, asset discovery and profiling •Automated, real-time, and integrated analytics •Activity baselining and anomaly detection •Out-of-the box rules and templates Embedded Intelligence Security intelligence for automated offense detection
  • 31. Our proposal with Security Intelligence & Integration Advantages and immediate gains Intelligence & Visibility (real time risk identification and management, continous automated audit, forensics, increased quality of services, alerts, privilleged users control, real time topology&inventory etc.) Centralized intelligent storage (of business, user, IT event data for auditors, reports, improved analysis of anything Current and future costs saving (technology and HR efficiency perspective) If used now of in future as integrated solution – the whole SOC (security operations centre)
  • 32.
  • 33. Integrated and Intelligent – IBM Security Systems
  • 34. Our proposal with Security Intelligence & Integration
  • 35. How we can help Analyze and detect risks Fulfill audit Build security action plan Train the employees Pass compliance regulations Save from data leakage Protect critical assets Get rid of passwords Consult Your professionals Protect from attacks Help creating RFP docs Be Your IT Security Advisor! Business value of «Data Security Solutions»
  • 36. Balancing costs and risk – floods happen..
  • 37. Our vision and goal for our Customers!
  • 38. Contact UsAndris Soroka andris@dss.lv Mob. +371 29162784 Riga, Latvia www.dss.lv LinkedIn: http://lv.linkedin.com/in/andsor Twitter: @andris_soroka / @dss_it_security Facebook: http://www.facebook.com/lvdss Youtube: http://ow.ly/FAfEN SlideShare: http://www.slideshare.net/andsor

Notes de l'éditeur

  1. www.dss.lv
  2. IT Security services (consulting, audit, pen-testing, market analysis, system testing and integration, training and technical support) Solutions and experience portfolio with more then 20 different technologies – Cybersecurity global market leaders from more than 10 countries Trusted service provider for banks, insurance companies, government, and private companies (critical infrastructure etc.) Own organized conference “DSS ITSEC” 5th annual event this year More than 400 guests and more than 250 online live streaming wievers from LV, EE, LT 4 parallel sessions with more than 40 international speakers, including Microsoft, Oracle, Symantec, IBM, CISCO, Samsung, F-Secure and many more – everything free of charge Participation in other events & sponsorship CERT & ISACA conferences RIGA COMM exhibition & conferences Roadshows and events in Latvia / Lithuania / Estonia (f.i. Vilnius Innovation Forum, Devcon, ITSEC HeadLight, SFK, business associations) Memebr of Latvian IT Cluster un LIKTA Participation in Cybersecurity discussions, strategy development, seminaries, publications, etc.
  3. Don’t want to predict the future. It is hard and easily can go wrong. It is present. 1000000 aps on Apstore, 1000000 aps on google store. http://www.youtube.com/watch?v=cCyGEzzZhTQ