SlideShare une entreprise Scribd logo
1  sur  25
WISER “WIDE-IMPACT CYBER SECURITY RISK FRAMEWORK”
www.cyberwiser.eu @cyberwiser
Co-funded by the European Commission
Horizon 2020 – Grant # 653321
Cybersecurity Risk Assessment –
‘All done’ with WISER
Riga – 27th October, 2016
Presentation at DSS ITSEC
DEMO
1
Antonio Álvarez Romero
Atos Spain
Outline
CyberWISER Services
Introduction to CyberWISER-Light
Introduction to CyberWISER-Essential
Conclusions
© WISER 2015 www.cyberwiser.eu - @cyberwiser 2
CyberWISER Services
CyberWISER Light – self-assessment of cyber risks and
vulnerabilities in IT system.
User-friendly service - suited to every type of organisation.
Especially good for time- and resource-constrained SMEs.
CyberWISER Essential – Risk Platform as a Service (RPaaS)
for self-assessment of exposure levels with continuous,
quasi-real-time monitoring
Standardised mitigation plan
CyberWISER Plus – RPaaS + Customised approach to cyber risk
assessment
Face-to-face support in self-assessment phase
Deployment support & mitigation plan tailored to your organisation
www.cyberwiser.eu
3© WISER 2016 www.cyberwiser.eu - @cyberwiser
CyberWISER Services
© WISER 2016 www.cyberwiser.eu - @cyberwiser 4
CyberWISER-Light (CWL)
Two versions: CWL Fast-track and Complete
Software as a Service
Online Questionnaire
Online Vulnerability scanner
Produces Aggregated Report
CyberWISER-Essential (CWE)
CyberWISER-Plus (CWP)
CyberWISER Services
© WISER 2016 www.cyberwiser.eu - @cyberwiser 5
CyberWISER-Light (CWL)
CyberWISER-Essential (CWE)
Risk Management PaaS
Sensors deployed at client produce data
Risk Assessment services in the Cloud
Dashboard showing real-time data and information
CyberWISER-Plus (CWP)
CyberWISER Services
© WISER 2016 www.cyberwiser.eu - @cyberwiser 6
CyberWISER-Light (CWL)
CyberWISER-Essential (CWE)
CyberWISER-Plus (CWP)
Extended with more specific Risk Models
Extended with specific application-level sensors
Outline
CyberWISER Services
Introduction to CyberWISER-Light
Introduction to CyberWISER-Essential
Conclusions
© WISER 2015 www.cyberwiser.eu - @cyberwiser 7
CyberWISER-Light
© WISER 2016 www.cyberwiser.eu - @cyberwiser 8
CyberWISER-Light Demo
© WISER 2015 www.cyberwiser.eu - @cyberwiser 9
Questionnaire
© WISER 2015 www.cyberwiser.eu - @cyberwiser 10
Vulnerability test
© WISER 2015 www.cyberwiser.eu - @cyberwiser 11
Vulnerability test
CyberWISER-Light Demo
© WISER 2015 www.cyberwiser.eu - @cyberwiser 13
Outline
© WISER 2015 www.cyberwiser.eu - @cyberwiser 14
CyberWISER Services
Introduction to CyberWISER-Light
Introduction to CyberWISER-Essential
Conclusions
CyberWISER-Essential
© WISER 2016 www.cyberwiser.eu - @cyberwiser 15
Dashboard with a set of sections
Risk Reporting
Configuration
Monitoring
Modelling
Testing
CyberWISER-Essential
© WISER 2016 www.cyberwiser.eu - @cyberwiser 16
Risk reporting
CyberWISER-Essential
© WISER 2016 www.cyberwiser.eu - @cyberwiser 17
Configuration
CyberWISER-Essential
© WISER 2016 www.cyberwiser.eu - @cyberwiser 18
Monitoring
CyberWISER-Essential
© WISER 2016 www.cyberwiser.eu - @cyberwiser 19
Modelling
CyberWISER-Essential
© WISER 2016 www.cyberwiser.eu - @cyberwiser 20
Testing
CyberWISER-Essential Demo Scenario
© WISER 2015 www.cyberwiser.eu - @cyberwiser 21
Simulation of an incident
The attacker uses Kali Linux from public IP address
The attacker executes a Hydra script
Wiser Agent detects the attack with Snort sensor (/var/log/snort/snort.alert)
Wiser Agent sends events to DWH
Show events received by Monitoring Engine from DWH via RabbitMQ
Show Alarm received in the RAE and how it is triggered the risk assessment
• Risk models selected
• DEXI instantiation
• Qualitative risk assessment per risk and target
• Aggregations:
• Overall
• By sections
• By risks
• Mitigation measures
CyberWISER-Essential Demo Scenario
© WISER 2015 www.cyberwiser.eu - @cyberwiser 22
Outline
© WISER 2015 www.cyberwiser.eu - @cyberwiser 23
CyberWISER Services
Introduction to CyberWISER-Light
Introduction to CyberWISER-Essential
Conclusions
CyberWISER: What’s in it for my organisation?
© WISER 2016 www.cyberwiser.eu - @cyberwiser 24
Affordable cyber risk assessment services depending on
customer needs & budget. Due to the real-time monitoring
and the increase of automatization of this assessment, prices
could be more competitive, and be affordable for segments as
SMEs, that have a low budget for these types of services.
Effective, efficient, and user-friendly solutions.
This is going to be achieved by means of an Online-centred
delivery model, which is found at www.cyberwiser.eu
Customised approach and a team of experts “on-call” (where
applicable), to overcome the intrinsic shortfalls of the one-fits-
all solution.
A “Cyber Security for all” approach!
www.cyberwiser.eu
@cyberwiser
Thank you for your attentions! Questions?
Contact
Antonio Álvarez Romero
Atos Spain
antonio.alvarez@atos.net

Contenu connexe

Tendances

2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity PredictionsNyotron
 
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top PredictionsState of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top PredictionsComodo SSL Store
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016ColloqueRISQ
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumZimperium
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityZimperium
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Cristian Garcia G.
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsSai Huda
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceZimperium
 
The Jisc vulnerability assessment management service – part 2: how to avoid t...
The Jisc vulnerability assessment management service – part 2: how to avoid t...The Jisc vulnerability assessment management service – part 2: how to avoid t...
The Jisc vulnerability assessment management service – part 2: how to avoid t...Jisc
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemMarketingArrowECS_CZ
 
Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0Vandana Verma
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Multi-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @BritopianMulti-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @BritopianMichael Brito | Zeno Group
 
Canarie kathryn anthonisen 16 9 rev
Canarie kathryn anthonisen 16 9 revCanarie kathryn anthonisen 16 9 rev
Canarie kathryn anthonisen 16 9 revColloqueRISQ
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskCristian Garcia G.
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceIBM Security
 

Tendances (20)

2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
 
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top PredictionsState of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top Predictions
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 
The Jisc vulnerability assessment management service – part 2: how to avoid t...
The Jisc vulnerability assessment management service – part 2: how to avoid t...The Jisc vulnerability assessment management service – part 2: how to avoid t...
The Jisc vulnerability assessment management service – part 2: how to avoid t...
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Surviving the Ransomware Plague
Surviving the Ransomware PlagueSurviving the Ransomware Plague
Surviving the Ransomware Plague
 
Multi-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @BritopianMulti-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @Britopian
 
Canarie kathryn anthonisen 16 9 rev
Canarie kathryn anthonisen 16 9 revCanarie kathryn anthonisen 16 9 rev
Canarie kathryn anthonisen 16 9 rev
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 

En vedette

LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012Don Grauel
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2Kenny Boddye
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk ManagementSocial Tables
 
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Ulf Mattsson
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
Risk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica CollegeRisk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica CollegeJeff Macharyas
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Martin Cabrera
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormGoutama Bachtiar
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and GovernanceSAP Analytics
 

En vedette (20)

LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012
 
Cyber for Beginners v2
Cyber for Beginners v2Cyber for Beginners v2
Cyber for Beginners v2
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
 
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Risk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica CollegeRisk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica College
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)
 
Computer history
Computer historyComputer history
Computer history
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment Form
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 

Similaire à Cybersecurity Risk Assessment - 'All Done' with WISER

The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glanceCYBERWISER .eu
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelSkybox Security
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...omgmaxsmith
 
Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with CybowallIdan Tohami
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing SecurityGurbir Singh
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraMarketingArrowECS_CZ
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020VMware Tanzu
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxAbasse KPEGOUNI
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...MarketingArrowECS_CZ
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
Security for Mission Critical Application
Security for Mission Critical ApplicationSecurity for Mission Critical Application
Security for Mission Critical ApplicationEurocontrolli s.r.l.
 

Similaire à Cybersecurity Risk Assessment - 'All Done' with WISER (20)

The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
 
Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with Cybowall
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Discover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & ManagementDiscover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & Management
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
Security for Mission Critical Application
Security for Mission Critical ApplicationSecurity for Mission Critical Application
Security for Mission Critical Application
 
Campus jueves
Campus juevesCampus jueves
Campus jueves
 

Dernier

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 

Dernier (17)

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 

Cybersecurity Risk Assessment - 'All Done' with WISER

  • 1. WISER “WIDE-IMPACT CYBER SECURITY RISK FRAMEWORK” www.cyberwiser.eu @cyberwiser Co-funded by the European Commission Horizon 2020 – Grant # 653321 Cybersecurity Risk Assessment – ‘All done’ with WISER Riga – 27th October, 2016 Presentation at DSS ITSEC DEMO 1 Antonio Álvarez Romero Atos Spain
  • 2. Outline CyberWISER Services Introduction to CyberWISER-Light Introduction to CyberWISER-Essential Conclusions © WISER 2015 www.cyberwiser.eu - @cyberwiser 2
  • 3. CyberWISER Services CyberWISER Light – self-assessment of cyber risks and vulnerabilities in IT system. User-friendly service - suited to every type of organisation. Especially good for time- and resource-constrained SMEs. CyberWISER Essential – Risk Platform as a Service (RPaaS) for self-assessment of exposure levels with continuous, quasi-real-time monitoring Standardised mitigation plan CyberWISER Plus – RPaaS + Customised approach to cyber risk assessment Face-to-face support in self-assessment phase Deployment support & mitigation plan tailored to your organisation www.cyberwiser.eu 3© WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 4. CyberWISER Services © WISER 2016 www.cyberwiser.eu - @cyberwiser 4 CyberWISER-Light (CWL) Two versions: CWL Fast-track and Complete Software as a Service Online Questionnaire Online Vulnerability scanner Produces Aggregated Report CyberWISER-Essential (CWE) CyberWISER-Plus (CWP)
  • 5. CyberWISER Services © WISER 2016 www.cyberwiser.eu - @cyberwiser 5 CyberWISER-Light (CWL) CyberWISER-Essential (CWE) Risk Management PaaS Sensors deployed at client produce data Risk Assessment services in the Cloud Dashboard showing real-time data and information CyberWISER-Plus (CWP)
  • 6. CyberWISER Services © WISER 2016 www.cyberwiser.eu - @cyberwiser 6 CyberWISER-Light (CWL) CyberWISER-Essential (CWE) CyberWISER-Plus (CWP) Extended with more specific Risk Models Extended with specific application-level sensors
  • 7. Outline CyberWISER Services Introduction to CyberWISER-Light Introduction to CyberWISER-Essential Conclusions © WISER 2015 www.cyberwiser.eu - @cyberwiser 7
  • 8. CyberWISER-Light © WISER 2016 www.cyberwiser.eu - @cyberwiser 8
  • 9. CyberWISER-Light Demo © WISER 2015 www.cyberwiser.eu - @cyberwiser 9
  • 10. Questionnaire © WISER 2015 www.cyberwiser.eu - @cyberwiser 10
  • 11. Vulnerability test © WISER 2015 www.cyberwiser.eu - @cyberwiser 11
  • 13. CyberWISER-Light Demo © WISER 2015 www.cyberwiser.eu - @cyberwiser 13
  • 14. Outline © WISER 2015 www.cyberwiser.eu - @cyberwiser 14 CyberWISER Services Introduction to CyberWISER-Light Introduction to CyberWISER-Essential Conclusions
  • 15. CyberWISER-Essential © WISER 2016 www.cyberwiser.eu - @cyberwiser 15 Dashboard with a set of sections Risk Reporting Configuration Monitoring Modelling Testing
  • 16. CyberWISER-Essential © WISER 2016 www.cyberwiser.eu - @cyberwiser 16 Risk reporting
  • 17. CyberWISER-Essential © WISER 2016 www.cyberwiser.eu - @cyberwiser 17 Configuration
  • 18. CyberWISER-Essential © WISER 2016 www.cyberwiser.eu - @cyberwiser 18 Monitoring
  • 19. CyberWISER-Essential © WISER 2016 www.cyberwiser.eu - @cyberwiser 19 Modelling
  • 20. CyberWISER-Essential © WISER 2016 www.cyberwiser.eu - @cyberwiser 20 Testing
  • 21. CyberWISER-Essential Demo Scenario © WISER 2015 www.cyberwiser.eu - @cyberwiser 21 Simulation of an incident The attacker uses Kali Linux from public IP address The attacker executes a Hydra script Wiser Agent detects the attack with Snort sensor (/var/log/snort/snort.alert) Wiser Agent sends events to DWH Show events received by Monitoring Engine from DWH via RabbitMQ Show Alarm received in the RAE and how it is triggered the risk assessment • Risk models selected • DEXI instantiation • Qualitative risk assessment per risk and target • Aggregations: • Overall • By sections • By risks • Mitigation measures
  • 22. CyberWISER-Essential Demo Scenario © WISER 2015 www.cyberwiser.eu - @cyberwiser 22
  • 23. Outline © WISER 2015 www.cyberwiser.eu - @cyberwiser 23 CyberWISER Services Introduction to CyberWISER-Light Introduction to CyberWISER-Essential Conclusions
  • 24. CyberWISER: What’s in it for my organisation? © WISER 2016 www.cyberwiser.eu - @cyberwiser 24 Affordable cyber risk assessment services depending on customer needs & budget. Due to the real-time monitoring and the increase of automatization of this assessment, prices could be more competitive, and be affordable for segments as SMEs, that have a low budget for these types of services. Effective, efficient, and user-friendly solutions. This is going to be achieved by means of an Online-centred delivery model, which is found at www.cyberwiser.eu Customised approach and a team of experts “on-call” (where applicable), to overcome the intrinsic shortfalls of the one-fits- all solution. A “Cyber Security for all” approach!
  • 25. www.cyberwiser.eu @cyberwiser Thank you for your attentions! Questions? Contact Antonio Álvarez Romero Atos Spain antonio.alvarez@atos.net