In 2015 alone, hackers stole the records of - 11 million people from Premiere Blue Cross- 10 million people from Excellus BlueCross BlueShield- 80 million people from Anthem. We review the challenges, trends and opportunity of the cyberspace wars. Presented to APICS Ventura on March 8, 2016 by Gerry Poe - CEO of Santa Clarita Consultants. http://www.scc-co.com
Boost PC performance: How more available memory can improve productivity
Enterprise Cyber Security 2016
1. ENTERPRISE CYBERSECURITY
“1 in 6 [of web-based applications] is a malware-related app. Imagine that from
the time of floppy disk drives where there would be 15 viruses a month, there
is now millions of malware being discovered on a daily basis.”
– Bill Chang, CEO of Group Enterprise, SingTel
3. In 2015 alone, hackers stole the records of
- 11 million people from Premiere Blue Cross
- 10 million people from Excellus BlueCross BlueShield
- 80 million people from Anthem
In contrast, only 22 million people
were directly affected by the
hackers who stole information from
the Office of Personnel
Management.
4. > Ransomware
> The Internet of Things
> Cyber-espionage
> Cyber theft increases
> Insecure Passwords
5. WHICH KINDS OF APPLICATIONS ARE
CAUSING THE MOST PROBLEMS?
6. Download free report on TruShield’s website at:
http://info.trushieldinc.com/2015-annual-cyber-threat-intelligence-report
7. “Brokers and clients have told us they want an end to unclear and
opaque language, as well as less promotion of off-the-shelf cyber
products by insurers and more joined-up risk management
solutions.”
- Tim Stapleton
Vice President and Cyber Insurance Product Manager, Overseas General Insurance at Chubb
8. When asked how many staff had completed their information security awareness
program, respondents in a quarter of organizations said that no more than 50% of staff
had done so.
9. Microsoft Active
Directory is the
foundation of cyber
85% of business and
government
worldwide, as well as
of privileged access
worldwide.
10. Taken together, the weaknesses
"could potentially compromise the
confidentiality, integrity, and
availability of HHS’ sensitive
information and information
systems," the report warned.
11. Businesses are constantly under “cyber attack. With the attack surface dramatically increased and a
mature attackers ecosystem, companies have to be ever more vigilant across all their IT assets"
- said Chan.
12. “Companies are trying to ensure business-as-usual systems are secure and effective
as well as working to drive change through the introduction of new technologies,
greater digitization and mobilization of internal and customer-facing systems.”
- Mark Peters, Managing Director, Protiviti
13. “Cyber security has
become a C-level issue,”
said Peter Swire, a
professor at Georgia
Tech, who advised
President Barack Obama
on US cyber security
strategy.
14. “In 2016, we expect boards, audit
committees, executives and
public officials to ask more
pointed questions to ascertain
whether their organization is in a
defensible position”
- KPMG concluded.
15. The bank is the largest in
Japan, where it faces more
than 80 percent of all cyber
attacks, but also provides
corporate banking services
in the UK.
16. 1) Developing cyberspace capabilities
2) Defending the DOD information network
3) Securing DOD data, and mitigating cyber risks
to DOD missions
4) Preparing to defend U.S. interests from major
cyber attacks
5) Developing cyber options to control cyber
warfare
6) Building international alliances to deter shared
global cyber threats.
Military cyber planning has six goals:
18. As attacks on industrial control
systems (ICSs) become more
frequent and increasingly
sophisticated, defensive strategies
must evolve to keep up.
Fortunately, the tools are getting
better.
Cyber security in process plants:
Recognizing risks, addressing current threats
19. By leveraging cyber risk management solutions, organizations can significantly
shorten time-to-remediation, increase operational efficiency, strengthen their
security posture, enforce cyber hygiene, improve response readiness, reduce
costs, and ultimately minimize cyber risks.
20. 1) Assume that hackers will ultimately penetrate your infrastructure.
2) Deception can be a useful component of a security strategy.
3) Cyberterrorism has begun.
4) Nearly everyone relies on information-security of 3rd parties for mission critical tasks.
5) Humans are often the weakest point in the security chain.
6) Emerging technologies are obviously great targets.
Six Emerging Cybersecurity Risks You Should Be Aware Of
21. “The small businesses, I
think, are much more at
risk than they realize,”
- Lisa Traina, CPA/CITP, CGMA,
President of Traina & Associates in
Louisiana.
22. "Protecting our industry from cyber threats is hard, probably one of the hardest things
we are facing because we do not know what we are facing or for what we have to
prepare“
- Jeff Poole,
Director General of the Civil Air Navigation Services Organization (CANSO)
23. Dan Trueman, head of cyber for Novae said that the size of broking and
underwriting teams for cyber has not kept pace with the growth of the
market for the risk.
24. Many SMBs don’t have the time, staff, expertise, or IT resources
to ensure that their businesses are protected, and F-Secure
states, as a result, SMBs face several cybersecurity
vulnerabilities.
25. “You don’t need autonomous cars to be hacked”
- Alexander Moiseev, Kaspersky’s Managing Director of Europe
26. A six life cycle program
“Honeywell addresses end-to-end Industrial Cyber
around people, process and technology into a six life
which needs to be continuously initiated” - Akhtar.
27. 1. The Hyper Click
2. The Slick Willie
3. The Boss Hogg
… and so on..
28. Cyber crime is real. It’s a daily occurrence; behind the scenes and in the
security equipment of every computer network.
Consistent, reliable cyber measures are a necessary mainstay of today’s
business operations.
Summary:
New technologies in service, help support
business-as-usual.
29. MAKING YOUR BUSINESS TECHNOLOGIES SIMPLY BRILLIANT!
Since 1987, Santa Clarita Consultants, a leading enterprise
provider, delivers business solutions to mid-market
- GERRY POE –
GPoe@scc-co.com
M: 661.645.5825