7. IsYour Business
At Risks?
With the increased in
Cyberattacks,
Cybersecurity is not
simply an IT issue but
must be viewed as
a Business Risk
8. Singapore
Cyber Landscape
Source:
Singapore’s Safer Cyberspace Masterplan 2020 – CSA.gov.sg
Singapore SME Cyber Preparedness Report 2019 by Chubb
40% of
Cyberattacks in SG
Target SMEs
65% of SMEs
were victims of
cyber incident in
the past year
40% of all
breaches involved
customer records
53% of cyber
incidents in the past
12 months were
caused by employees
14. Image source: Google
Google Malaysia Thai Airways
SMRT Website 13 Schools in Singapore Credit Bureau Singapore
Trump Campaign Website
VisualWeb Defacement
15. Case 1: British Airways (Sep 2018)
- Website breach
- Undetected for more than 2 months
- Personal and payment information were
compromised
Source: ico.org.uk, www.cnet.com
22. Business Implications
Monetary loss
- Money transferred to Hackers’ account
Ransomware
- Busines disruption
- Recovery cost
Malware infecting network and servers
- Affecting business operations and
productivity
23. CHRONOLOGY OF DATA BREACH
Personal Data
3rd Party Corporate Data
Information
Unauthorized
Access/Disclosure/Use
Theft / Loss
Forensic
Investigation
Legal Review
Notification
Public
Relations
Legal Defence
Costs
Damages &
Settlements
Reputational
Damage
Business
Income Loss
DISCOVERY OF A
DATA BREACH
EVALUATIONOF
THE DATA
BREACH
SHORT
TERM
RESPONSE
LONGTERM
CONSEQUENCES
24. Shared Responsibility Model?
CUSTOMER
RESPONSIBILITY FOR
SECURITY “IN”THE CLOUD
CLOUD SERVICE PROVIDER
RESPONSIBILITY FOR
SECURITY “OF”THE CLOUD
CustomerApplications & Content
Network
Security
Identity &
Access
Control
Operating
System /
Platform
Data
Encryption
Cloud Platform
Physical
Infrastructure
Network
Infrastructure
Virtualization
Layer
47. A completely new approach to
Endpoint Security
Synchronized Security
Intercept
48. Cross-Estate Communication
Sophos Endpoint shares infection
status with the security system,
triggering automatic responses
21 Malware Detection
Sophos Endpoint detects a
malware attack
Device Isolation
XG Firewall instantly isolates the
computer, preventing the attack from
spreading, and communication with
C2 servers.
3
Clean-up
Sophos Endpoint automatically cleans up the
infection. Once the malware is removed, Sophos
Endpoint shares this update with the cybersecurity
system
4
Security Heartbeat™
Access Restored
XG Firewall restores network
access. Root Cause Analysis
provides detailed view of what
happened.
5
Respond
Respond automatically to incidentsSynchronized Security Heartbeat
57. ➢ Extension toYour IT Dept
➢ OPEX Model Available
➢ 24/7 Support Helpdesk
➢ 24/7 Monitoring
➢ Alert Notification
➢ Monthly Reporting
Managed Service
Network
Cybersecurity
System
BUSINESS FOCUS
not technology