cyber protect yourselves against the growing reality of a
play

Cyber: Protect yourselves against the growing reality of a cyber- - PowerPoint PPT Presentation

Cyber: Protect yourselves against the growing reality of a cyber- attack Dibble Clark M: +44 17917 623 068 T: +44 1684 878178 F: +44 1684 878171 dibble.clark@3sdl.com What is Cyber? Commercial in Confidence Policy in Action Commercial in


  1. Cyber: Protect yourselves against the growing reality of a cyber- attack’

  2. Dibble Clark M: +44 17917 623 068 T: +44 1684 878178 F: +44 1684 878171 dibble.clark@3sdl.com

  3. What is Cyber? Commercial in Confidence

  4. Policy in Action Commercial in Confidence

  5. Attack Sophistication versus Intruder Technical Knowledge Commercial in Confidence

  6. Topical Issues • Data Protection Act • Business Continuity • Insurance • Policy and Standards • Customer supply chain management • Divestment Commercial in Confidence

  7. Managing Risk? Commercial in Confidence

  8. LIVE HACK DEMO finditinworcestershire 20150421

  9. Cyber Essentials UK Government Recommendation Tom Dold National Cyber Skills Centre, Malvern, Worcestershire

  10. What is at Risk  Your Business  Customer and Supplier Confidential Data  Your Reputation  Customer and Supplier Systems  How  All devices connected to networks  Risks will increase with the “internet of things”  Human Engineering

  11. Solutions?

  12. The Five Cyber Essentials Controls  Firewalls  Access Control  Secure Configuration  Malware  Software Management 14/04/2015 14

  13. Firewalls  Firewalls are a front line of defence between the internet and your network, your systems and your data  They control traffic passing through them and can prevent people on the internet from accessing your devices and exploiting vulnerabilities

  14. Access Control  Access control ensures that users only have access to data which they are entitled to access.  It is particularly important to restrict access to privileged or “admin” accounts that could allow a malicious actor to install software and bypass controls

  15. Secure Configuration  “Out of the box” computers and devices often contain unnecessary software and default passwords which can make them insecure and vulnerable to cyber threats. Cyber essentials requires these settings to be changed to make systems more secure.

  16. Malware  Computers and mobile devices are vulnerable to malicious software (“malware”), such as viruses. Simple anti -malware software can reduce this risk significantly

  17. Software Management  Software frequently contains weaknesses or security vulnerabilities. Software suppliers release regular updates or “patches” to resolve these weaknesses. Managing the software updates is an important way to reduce cyber risks.

  18. More Information on Cyber Security? insights.cyberskillscentre.com

  19. Your Takeaway?  There is a real risk lurking out there, don’t get caught out!  Learn more about and get Cyber Essentials

  20. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend