SlideShare une entreprise Scribd logo
1  sur  12
Tips on How IT
Can Protect Retail
Environments.10
Minimize the impact of attacks by
adopting a threat-centric security
approach across the entire attack
continuum – before, during, and after
an attack. .1
@CiscoSecurity @CiscoRetail
Secure customer data at every touch
point – in-store, online, email, and
mobile.
.2
Before an attack, establish baseline
metrics for your environment.
.3
@CiscoSecurity @CiscoRetail
Establish refresh strategies for all
software and operating systems, giving
priority to quickly patching high-priority
vulnerabilities.
.
4
Get full visibility into the network to
better understand your risks and how
to best to secure and segment the
network.

5
@CiscoSecurity @CiscoRetail
Tailor your network to its threats
by automating critical security
activities that exhibit suspicious
behavior.6
Defend your network with
technology that automatically looks
for Indicators of Compromise (IOCs)
left behind by malware.7
@CiscoSecurity @CiscoRetail
Establish relationships with experts to
provide the latest threat intelligence
and best practices for readiness
and response.8
Build trusted partnerships with vendors
and service providers and require that
they follow information security best
practices.9
@CiscoSecurity @CiscoRetail
 Use security as a critical business
driver for establishing trust as you
adopt new technologies to deliver
new customer experiences.10
Learn more about making security
a driver for your retail business::
Download the Report Explore the Solutions
@CiscoSecurity @CiscoRetail

Contenu connexe

En vedette

En vedette (12)

La nueva realidad del petróleo y el gas
La nueva realidad del petróleo y el gasLa nueva realidad del petróleo y el gas
La nueva realidad del petróleo y el gas
 
Innowacyjna sprzedaż
Innowacyjna sprzedażInnowacyjna sprzedaż
Innowacyjna sprzedaż
 
The Last Checkout Line - Japanese
The Last Checkout Line - JapaneseThe Last Checkout Line - Japanese
The Last Checkout Line - Japanese
 
Przypomnienie o konsekwencjach
Przypomnienie o konsekwencjachPrzypomnienie o konsekwencjach
Przypomnienie o konsekwencjach
 
Новая реальность нефтегазовой отрасли
Новая реальность нефтегазовой отраслиНовая реальность нефтегазовой отрасли
Новая реальность нефтегазовой отрасли
 
Mitigating Cloud Risks
Mitigating Cloud RisksMitigating Cloud Risks
Mitigating Cloud Risks
 
We doen er alles aan om een einde te maken aan terugroepingen van producten
We doen er alles aan om een einde te maken aan terugroepingen van productenWe doen er alles aan om een einde te maken aan terugroepingen van producten
We doen er alles aan om een einde te maken aan terugroepingen van producten
 
La última cola para pagar
La última cola para pagarLa última cola para pagar
La última cola para pagar
 
The Last Checkout Line - Chinese
The Last Checkout Line - ChineseThe Last Checkout Line - Chinese
The Last Checkout Line - Chinese
 
Agir ou subir
Agir ou subirAgir ou subir
Agir ou subir
 
Digital Technologies: Today’s New Crime Fighters
 Digital Technologies: Today’s New Crime Fighters Digital Technologies: Today’s New Crime Fighters
Digital Technologies: Today’s New Crime Fighters
 
The Last Traffic Jam - Chinese
The Last Traffic Jam - ChineseThe Last Traffic Jam - Chinese
The Last Traffic Jam - Chinese
 

Plus de Connected Futures

Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures
 
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build TrucksSummary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
Connected Futures
 
A transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as CoisasA transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as Coisas
Connected Futures
 
Part 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suitePart 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suite
Connected Futures
 

Plus de Connected Futures (20)

Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
 
Digital Healthcare Providers: Forget Sexy, Focus on Boring
Digital Healthcare Providers: Forget Sexy, Focus on BoringDigital Healthcare Providers: Forget Sexy, Focus on Boring
Digital Healthcare Providers: Forget Sexy, Focus on Boring
 
IT's New Starring Role
IT's New Starring RoleIT's New Starring Role
IT's New Starring Role
 
Notable Quotes from Gartner Symposium/ITxpo
Notable Quotes from Gartner Symposium/ITxpoNotable Quotes from Gartner Symposium/ITxpo
Notable Quotes from Gartner Symposium/ITxpo
 
More Personalization = More Money
More Personalization = More MoneyMore Personalization = More Money
More Personalization = More Money
 
More Digital = More Money
More Digital = More MoneyMore Digital = More Money
More Digital = More Money
 
More Channels = More Money
More Channels = More MoneyMore Channels = More Money
More Channels = More Money
 
More Mobile = More Money
More Mobile = More MoneyMore Mobile = More Money
More Mobile = More Money
 
Why the CFO is the Ideal Champion for Cybersecurity: Part 2
Why the CFO is the Ideal Champion for Cybersecurity: Part 2Why the CFO is the Ideal Champion for Cybersecurity: Part 2
Why the CFO is the Ideal Champion for Cybersecurity: Part 2
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of Things
 
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
Connected Futures Podcast: The Digital Manufacturer – Resolving the Service D...
 
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build TrucksSummary: Digital Manufacturing Powers a Better Way to Build Trucks
Summary: Digital Manufacturing Powers a Better Way to Build Trucks
 
A transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as CoisasA transformação digital com a Internet de Todas as Coisas
A transformação digital com a Internet de Todas as Coisas
 
Improving Healthcare Through Digital Transformation
Improving Healthcare Through Digital TransformationImproving Healthcare Through Digital Transformation
Improving Healthcare Through Digital Transformation
 
Part 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suitePart 2 - Digital Transformation: Secrets of the Successful C-suite
Part 2 - Digital Transformation: Secrets of the Successful C-suite
 
Transfórmese o sucumba a la transformación
Transfórmese o sucumba a la transformaciónTransfórmese o sucumba a la transformación
Transfórmese o sucumba a la transformación
 
Verstoren of verstoord worden
Verstoren of verstoord worden Verstoren of verstoord worden
Verstoren of verstoord worden
 
Scegli se guidare la trasformazione digitale o subirla
Scegli se guidare la trasformazione digitale o subirlaScegli se guidare la trasformazione digitale o subirla
Scegli se guidare la trasformazione digitale o subirla
 
Digital Transformation in Retail
Digital Transformation in RetailDigital Transformation in Retail
Digital Transformation in Retail
 
Retail Value at Stake Infographic
Retail Value at Stake InfographicRetail Value at Stake Infographic
Retail Value at Stake Infographic
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

Top 10 Tips on How IT Can Protect Retail Environments

  • 1. Tips on How IT Can Protect Retail Environments.10
  • 2. Minimize the impact of attacks by adopting a threat-centric security approach across the entire attack continuum – before, during, and after an attack. .1 @CiscoSecurity @CiscoRetail
  • 3. Secure customer data at every touch point – in-store, online, email, and mobile. .2
  • 4. Before an attack, establish baseline metrics for your environment. .3 @CiscoSecurity @CiscoRetail
  • 5. Establish refresh strategies for all software and operating systems, giving priority to quickly patching high-priority vulnerabilities. . 4
  • 6. Get full visibility into the network to better understand your risks and how to best to secure and segment the network.  5 @CiscoSecurity @CiscoRetail
  • 7. Tailor your network to its threats by automating critical security activities that exhibit suspicious behavior.6
  • 8. Defend your network with technology that automatically looks for Indicators of Compromise (IOCs) left behind by malware.7 @CiscoSecurity @CiscoRetail
  • 9. Establish relationships with experts to provide the latest threat intelligence and best practices for readiness and response.8
  • 10. Build trusted partnerships with vendors and service providers and require that they follow information security best practices.9 @CiscoSecurity @CiscoRetail
  • 11.  Use security as a critical business driver for establishing trust as you adopt new technologies to deliver new customer experiences.10
  • 12. Learn more about making security a driver for your retail business:: Download the Report Explore the Solutions @CiscoSecurity @CiscoRetail

Notes de l'éditeur

  1. Shorten copy
  2. Make cisco logo the same color as the text
  3. Shorten this copy
  4. Shorten this copy