SlideShare une entreprise Scribd logo
1  sur  25
Continuity and Resilience (CORE)
ISO 22301 BCM Consulting Firm
Presentations by speakers at the
7th ME Business & IT Resilience Summit
March 11, 2018 at The Address Hotel, Duabi Mall, Dubai, UAE
Our Contact Details:
UAE INDIA
Continuity and Resilience
Website: www.coreconsulting.ae
Tel: +971 2 6594006
PO Box: 25722, Abu Dhabi, United Arab Emirates
Email: info@continuityandresilience.com
Continuity and Resilience
Tel: +91 11 41055534 | Direct: +91 11 6467 9380
Email: info@continuityandresilience.com
Website: www.coreconsulting.ae
Level 15, Eros Corporate Towers, Nehru Place, New
Delhi – 110019, India
Business Continuity Manager to face
a Cyber attack
Roberto Perego – ORBIT Italy
Founder, Chief Sales and Marketing Officer
2017 ORBIT Italy s.r.l. – All rights reserved
The challenge
The failure to manage your digital risks is likely to sabotage your digital
business and expose your organization to potential impacts well
beyond a simple opportunity loss. The extent to which CIOs engage in
digital risk management can be a crucial factor in avoiding such
dangers.
Source (Gartner Group): Cybersecurity and Digital Risk Management: CIOs Must
Engage and Prepare Published: 17 January 2018 by Rob McMillan | Paul E. Proctor
Why Me:
 14 years of experience in business continuity and risk
management (after a long experience in many large organization)
 I founded and still run a company that deals only with BC, risk
management and now, privacy data treatment
 More that 20.000 users are using ORBIT4BC
 In 2017 my company invested 22% of the turnover in R&D
2017 ORBIT Italy s.r.l. – All rights reserved
Today’s topic
Source: Cyber Resilience Report 2017 – BCI – www.thebci.org
… can’t be underestimates
Cyber Attack: not just data breaches
2017 ORBIT Italy s.r.l. – All rights reserved
 Data loss and destruction (Ransomware)
Source: Forbes.com
2017 ORBIT Italy s.r.l. – All rights reserved
 Physical damage to critical infrastructures
Illustration: L-Dopa
Cyber Attack: not just data breaches
Fortune: http://fortune.com/sony-hack-part-1/
2017 ORBIT Italy s.r.l. – All rights reserved
 Stopping business operations for days, if not weeks
Cyber Attack: not just data breaches
2017 ORBIT Italy s.r.l. – All rights reserved
 Using computational resources: cryptojacking
Cyber Attack: not just data breaches
Why it’s not only an IT issue?
2017 ORBIT Italy s.r.l. – All rights reserved
What Cybersecurity Trends Tell You1
 You can't possibly fix everything:
• Don't hope, don't try, don't make yourself obligated to do so
• Fix the most important things first
 You can't make your assets fully secure:
• You can prioritize and provide the best security for high-value assets
 You can't know how secure they all are:
• You can have enough visibility to high-value assets if you know where they are
 You certainly can't know how secure your digital partners are:
• You can have better oversight of your supply chain security strategy(digital and
physical)
Source: Gartner Essentials: Top Cybersecurity Trends for 2017 (Advanced) Peter Firstbrook
Gartner Summit - September 2017
Going back to our BC world
2017 ORBIT Italy s.r.l. – All rights reserved
Gartner Report July 2017
Analyst(s): Roberta J. Witty, Mark Thomas Jaggers, John P Morency, Adam Schneeberger
Continuity of operations is vital for maintaining
organizational confidence, reputation and, in some cases,
survival. Security and risk management leaders
responsible for business continuity need to understand
the full scope of their BCM efforts, which should comprise
an enterprise-wide program
Five pillars to prove yourself against a crisis
caused by a cyber attack
2017 ORBIT Italy s.r.l. – All rights reserved
 Awareness: build culture
on managing a crisis
caused by cyber attack
 Incident : can an incident
be a signal?
 Evolution from BCM to
BCM2
 Managing a crisis caused
by a cyber attack
 Communication during a
cyber attack
Awareness1
Build a culture of crisis management in case of cyber attack, in other words a
360° program on “security awareness “
2017 ORBIT Italy s.r.l. – All rights reserved
 Education to help people understand
responsibility on data saving, and
software to manage behavioural changes.
 Identify the biggest risk-areas within the
employees and build simulations to verify
their readiness and skills to respond to
specific attack.
 Continuous communication to
strengthen awareness and awards to
people that put in place correct
behaviours on maintaining security at the
top.
Source: Three Critical Factors in Building a Comprehensive Security Awareness Program – Sept. 2017 by Joanna G. Hiusman – Gartner G.
2017 ORBIT Italy s.r.l. – All rights reserved
Go for a check
What do you usually do:
Nothing Nothing (start thinking
what’s going on)
You have done a mental association among three not
critical events occurred in a temporal space of three
weeks
t 0 after 3 weeksafter a week
Incident Management
Incident Management
2017 ORBIT Italy s.r.l. – All rights reserved
A professional Incident management tool connected to a BCM
tool must help BC Managers with the following:
 Capability to capture events that only apparently do not tell a BC
Manager that a cyber attack is underway
 Monitor and link events according not usual rules for instance track an
increase of some events in a day, or increased traffic that can be seen as
performance downgrade
 Intelligent system that connect such events and make “what if” analysis
Be ready to activate BCM2 even if the
probability to be under a “cyber attack” is low
Evolution from BCM to BCM2 Before crisis
2017 ORBIT Italy s.r.l. – All rights reserved
BCM
Tool
BCM
Tool
Client Data Center Outsourcer Data Center
1. Make a copy of the BCM
Software tool weekly or
any time there are
changes and adaptations
2. Make a daily copy of
BCM data that will be
encrypted in the
outsourcer datacentre
BCM’s tool copy
Evolution from BCM to BCM2 During the crisis
2017 ORBIT Italy s.r.l. – All rights reserved
Outsourcer Data Center
2. Access through «https»
to software for BC
management
BCM’s tool copy
1. Delivery of the
decryption key
Evolution from BCM to BCM2 Return from crisis
2017 ORBIT Italy s.r.l. – All rights reserved
BCM
Tool
BCM
Tool
Client Data Center Outsourcer Data Center
1. Data encryption
2. DB transfer with BC dataBCM’s tool copy
PROCESS
PROCESS
PROCESS
Managing a crisis caused by a cyber-attack
2017 ORBIT Italy s.r.l. – All rights reserved
App
App
App
App
App
App
PROCESS PROCESS
PROCESS PROCESS
PROCESS PROCESS
PROCESS PROCESS PROCESS
PROCESS PROCESS PROCESS
PROCESS PROCESS PROCESS
PROCESS PROCESS PROCESS
HWHW HW
HW
HW
HW
HW
HW HW
HW
HW
HW
SW
SW
SW SW
SW
SW
SW
SW
SW
CMDB IntegrationBCMS
Managing a crisis caused by a cyber-attack
Communication in case of cyber attack
2017 ORBIT Italy s.r.l. – All rights reserved
HWHW HW
HW
HW
HW
HW HW
HW
HW
HW
Quick communication, many
to many, can’t happen
without an advanced
notification system
Communication in case of cyber attack
2017 ORBIT Italy s.r.l. – All rights reserved
Conclusion – the real life
2017 ORBIT Italy s.r.l. – All rights reserved
BC Manager facing a cyber attack ORBIT4BC fits
Awareness: build culture on
managing a crisis caused by cyber
attack
Educational program done in
cooperation with international
firms
Incident : can an incident be a
signal?
ORBIT4BC Incident management
module
Evolution from BCM to BCM2
ORBIT4BC BCM square module in
collaboration with local or
international outsourcers
Managing a crisis caused by a
cyber attack
ORBIT4BC Crisis management
module and integration with
CMDB module
Communication during a cyber
attack
ORBIT4BC Integration with MIR3
and MIR3 (Onsolve)
Thanks for the attention
r.perego@orbititaly.com
Process Excellence and Resilience...
Creating Corporate Sustainability
Continuity and Resilience (CORE)
ISO 22301 BCM Consulting Firm
Presentations by our partners and
extended team of industry experts
UAE INDIA
Continuity and Resilience
Website: www.coreconsulting.ae
Tel: +971 2 6594006
PO Box: 25722, Abu Dhabi, United Arab Emirates
Email: info@continuityandresilience.com
Continuity and Resilience
Tel: +91 11 41055534 | Direct: +91 11 6467 9380
Email: info@continuityandresilience.com
Website: www.coreconsulting.ae
Level 15, Eros Corporate Towers, Nehru Place, New Delhi –
110019, India

Contenu connexe

Tendances

Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000PECB
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...PECB
 
Iso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelinesIso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelinesMohsen Gharakhani
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costPECB
 
Business Continuity Management System ISO 22301:2012 An Overview
Business Continuity Management System ISO 22301:2012 An OverviewBusiness Continuity Management System ISO 22301:2012 An Overview
Business Continuity Management System ISO 22301:2012 An OverviewAhmed Riad .
 
PECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB
 
Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?Alvin Integrated Services [AIS]
 
Centralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and ComplianceCentralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and CompliancePECB
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsPECB
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...PECB
 
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...PECB
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk ManagementShaun Sloan
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyPECB
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?Alvin Integrated Services [AIS]
 

Tendances (20)

Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...
 
Iso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelinesIso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelines
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and cost
 
Business Continuity Management System ISO 22301:2012 An Overview
Business Continuity Management System ISO 22301:2012 An OverviewBusiness Continuity Management System ISO 22301:2012 An Overview
Business Continuity Management System ISO 22301:2012 An Overview
 
PECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEsPECB Webinar: Risk-management in IT intensive SMEs
PECB Webinar: Risk-management in IT intensive SMEs
 
Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?Business Continuity Management System: How, Why and for What?
Business Continuity Management System: How, Why and for What?
 
Centralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and ComplianceCentralized operations – Risk, Control, and Compliance
Centralized operations – Risk, Control, and Compliance
 
Intégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSsIntégrating ISO 37001 MS with other MSs
Intégrating ISO 37001 MS with other MSs
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
 
SAMA BCM Framework
SAMA BCM Framework SAMA BCM Framework
SAMA BCM Framework
 
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 SimultaneouslyBest Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
Best Approach to Integrate ISO 9001 and ISO 27001 Simultaneously
 
MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
COVID – 19 and Resilience: Has ISO 22316 standard been responsive?
 

Similaire à Business Continuity Managers’ Action Plan to Face a Cyber Attack

Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityAdlan Hussain
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewMorgan Jones
 
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...Money 2Conf
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOisc2-hellenic
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...Black Duck by Synopsys
 
Chris neely the future of cyber security events 3
Chris neely the future of cyber security   events 3Chris neely the future of cyber security   events 3
Chris neely the future of cyber security events 3Redazione InnovaPuglia
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 

Similaire à Business Continuity Managers’ Action Plan to Face a Cyber Attack (20)

Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
Top Cybersecurity Trends In 2022 - What Does The Future Hold For Anti-Scam & ...
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
The New Style of Business
The New Style of Business The New Style of Business
The New Style of Business
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Chris neely the future of cyber security events 3
Chris neely the future of cyber security   events 3Chris neely the future of cyber security   events 3
Chris neely the future of cyber security events 3
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 

Plus de Continuity and Resilience

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul GantContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...Continuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...Continuity and Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceContinuity and Resilience
 
Value of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastValue of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastContinuity and Resilience
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesContinuity and Resilience
 
Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response Continuity and Resilience
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Continuity and Resilience
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorContinuity and Resilience
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Continuity and Resilience
 
BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..Continuity and Resilience
 

Plus de Continuity and Resilience (20)

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
 
DEFLUFFING RESILIENCE
DEFLUFFING RESILIENCEDEFLUFFING RESILIENCE
DEFLUFFING RESILIENCE
 
CREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAMCREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAM
 
BCM Challenges and Compliance
BCM Challenges and Compliance BCM Challenges and Compliance
BCM Challenges and Compliance
 
Thriving in the Crisis Situation
Thriving in the Crisis SituationThriving in the Crisis Situation
Thriving in the Crisis Situation
 
Cyber Security & IT Resilience
Cyber Security & IT Resilience Cyber Security & IT Resilience
Cyber Security & IT Resilience
 
Enterprise Resilience
Enterprise ResilienceEnterprise Resilience
Enterprise Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise Resilience
 
Bcm is all about people!
Bcm   is all about people!Bcm   is all about people!
Bcm is all about people!
 
Value of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastValue of Work Place Services in the Middle East
Value of Work Place Services in the Middle East
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case Studies
 
Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation Sector
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.
 
BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..
 

Dernier

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 

Dernier (20)

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 

Business Continuity Managers’ Action Plan to Face a Cyber Attack

  • 1. Continuity and Resilience (CORE) ISO 22301 BCM Consulting Firm Presentations by speakers at the 7th ME Business & IT Resilience Summit March 11, 2018 at The Address Hotel, Duabi Mall, Dubai, UAE Our Contact Details: UAE INDIA Continuity and Resilience Website: www.coreconsulting.ae Tel: +971 2 6594006 PO Box: 25722, Abu Dhabi, United Arab Emirates Email: info@continuityandresilience.com Continuity and Resilience Tel: +91 11 41055534 | Direct: +91 11 6467 9380 Email: info@continuityandresilience.com Website: www.coreconsulting.ae Level 15, Eros Corporate Towers, Nehru Place, New Delhi – 110019, India
  • 2. Business Continuity Manager to face a Cyber attack Roberto Perego – ORBIT Italy Founder, Chief Sales and Marketing Officer
  • 3. 2017 ORBIT Italy s.r.l. – All rights reserved The challenge The failure to manage your digital risks is likely to sabotage your digital business and expose your organization to potential impacts well beyond a simple opportunity loss. The extent to which CIOs engage in digital risk management can be a crucial factor in avoiding such dangers. Source (Gartner Group): Cybersecurity and Digital Risk Management: CIOs Must Engage and Prepare Published: 17 January 2018 by Rob McMillan | Paul E. Proctor Why Me:  14 years of experience in business continuity and risk management (after a long experience in many large organization)  I founded and still run a company that deals only with BC, risk management and now, privacy data treatment  More that 20.000 users are using ORBIT4BC  In 2017 my company invested 22% of the turnover in R&D
  • 4. 2017 ORBIT Italy s.r.l. – All rights reserved Today’s topic
  • 5. Source: Cyber Resilience Report 2017 – BCI – www.thebci.org … can’t be underestimates
  • 6. Cyber Attack: not just data breaches 2017 ORBIT Italy s.r.l. – All rights reserved  Data loss and destruction (Ransomware) Source: Forbes.com
  • 7. 2017 ORBIT Italy s.r.l. – All rights reserved  Physical damage to critical infrastructures Illustration: L-Dopa Cyber Attack: not just data breaches
  • 8. Fortune: http://fortune.com/sony-hack-part-1/ 2017 ORBIT Italy s.r.l. – All rights reserved  Stopping business operations for days, if not weeks Cyber Attack: not just data breaches
  • 9. 2017 ORBIT Italy s.r.l. – All rights reserved  Using computational resources: cryptojacking Cyber Attack: not just data breaches
  • 10. Why it’s not only an IT issue? 2017 ORBIT Italy s.r.l. – All rights reserved What Cybersecurity Trends Tell You1  You can't possibly fix everything: • Don't hope, don't try, don't make yourself obligated to do so • Fix the most important things first  You can't make your assets fully secure: • You can prioritize and provide the best security for high-value assets  You can't know how secure they all are: • You can have enough visibility to high-value assets if you know where they are  You certainly can't know how secure your digital partners are: • You can have better oversight of your supply chain security strategy(digital and physical) Source: Gartner Essentials: Top Cybersecurity Trends for 2017 (Advanced) Peter Firstbrook Gartner Summit - September 2017
  • 11. Going back to our BC world 2017 ORBIT Italy s.r.l. – All rights reserved Gartner Report July 2017 Analyst(s): Roberta J. Witty, Mark Thomas Jaggers, John P Morency, Adam Schneeberger Continuity of operations is vital for maintaining organizational confidence, reputation and, in some cases, survival. Security and risk management leaders responsible for business continuity need to understand the full scope of their BCM efforts, which should comprise an enterprise-wide program
  • 12. Five pillars to prove yourself against a crisis caused by a cyber attack 2017 ORBIT Italy s.r.l. – All rights reserved  Awareness: build culture on managing a crisis caused by cyber attack  Incident : can an incident be a signal?  Evolution from BCM to BCM2  Managing a crisis caused by a cyber attack  Communication during a cyber attack
  • 13. Awareness1 Build a culture of crisis management in case of cyber attack, in other words a 360° program on “security awareness “ 2017 ORBIT Italy s.r.l. – All rights reserved  Education to help people understand responsibility on data saving, and software to manage behavioural changes.  Identify the biggest risk-areas within the employees and build simulations to verify their readiness and skills to respond to specific attack.  Continuous communication to strengthen awareness and awards to people that put in place correct behaviours on maintaining security at the top. Source: Three Critical Factors in Building a Comprehensive Security Awareness Program – Sept. 2017 by Joanna G. Hiusman – Gartner G.
  • 14. 2017 ORBIT Italy s.r.l. – All rights reserved Go for a check What do you usually do: Nothing Nothing (start thinking what’s going on) You have done a mental association among three not critical events occurred in a temporal space of three weeks t 0 after 3 weeksafter a week Incident Management
  • 15. Incident Management 2017 ORBIT Italy s.r.l. – All rights reserved A professional Incident management tool connected to a BCM tool must help BC Managers with the following:  Capability to capture events that only apparently do not tell a BC Manager that a cyber attack is underway  Monitor and link events according not usual rules for instance track an increase of some events in a day, or increased traffic that can be seen as performance downgrade  Intelligent system that connect such events and make “what if” analysis Be ready to activate BCM2 even if the probability to be under a “cyber attack” is low
  • 16. Evolution from BCM to BCM2 Before crisis 2017 ORBIT Italy s.r.l. – All rights reserved BCM Tool BCM Tool Client Data Center Outsourcer Data Center 1. Make a copy of the BCM Software tool weekly or any time there are changes and adaptations 2. Make a daily copy of BCM data that will be encrypted in the outsourcer datacentre BCM’s tool copy
  • 17. Evolution from BCM to BCM2 During the crisis 2017 ORBIT Italy s.r.l. – All rights reserved Outsourcer Data Center 2. Access through «https» to software for BC management BCM’s tool copy 1. Delivery of the decryption key
  • 18. Evolution from BCM to BCM2 Return from crisis 2017 ORBIT Italy s.r.l. – All rights reserved BCM Tool BCM Tool Client Data Center Outsourcer Data Center 1. Data encryption 2. DB transfer with BC dataBCM’s tool copy
  • 19. PROCESS PROCESS PROCESS Managing a crisis caused by a cyber-attack 2017 ORBIT Italy s.r.l. – All rights reserved App App App App App App PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS PROCESS HWHW HW HW HW HW HW HW HW HW HW HW SW SW SW SW SW SW SW SW SW
  • 20. CMDB IntegrationBCMS Managing a crisis caused by a cyber-attack
  • 21. Communication in case of cyber attack 2017 ORBIT Italy s.r.l. – All rights reserved
  • 22. HWHW HW HW HW HW HW HW HW HW HW Quick communication, many to many, can’t happen without an advanced notification system Communication in case of cyber attack 2017 ORBIT Italy s.r.l. – All rights reserved
  • 23. Conclusion – the real life 2017 ORBIT Italy s.r.l. – All rights reserved BC Manager facing a cyber attack ORBIT4BC fits Awareness: build culture on managing a crisis caused by cyber attack Educational program done in cooperation with international firms Incident : can an incident be a signal? ORBIT4BC Incident management module Evolution from BCM to BCM2 ORBIT4BC BCM square module in collaboration with local or international outsourcers Managing a crisis caused by a cyber attack ORBIT4BC Crisis management module and integration with CMDB module Communication during a cyber attack ORBIT4BC Integration with MIR3 and MIR3 (Onsolve)
  • 24. Thanks for the attention r.perego@orbititaly.com
  • 25. Process Excellence and Resilience... Creating Corporate Sustainability Continuity and Resilience (CORE) ISO 22301 BCM Consulting Firm Presentations by our partners and extended team of industry experts UAE INDIA Continuity and Resilience Website: www.coreconsulting.ae Tel: +971 2 6594006 PO Box: 25722, Abu Dhabi, United Arab Emirates Email: info@continuityandresilience.com Continuity and Resilience Tel: +91 11 41055534 | Direct: +91 11 6467 9380 Email: info@continuityandresilience.com Website: www.coreconsulting.ae Level 15, Eros Corporate Towers, Nehru Place, New Delhi – 110019, India