Cyber: Protect yourselves against the growing reality of a cyber- - - PowerPoint PPT Presentation

cyber protect yourselves against the growing reality of a
SMART_READER_LITE
LIVE PREVIEW

Cyber: Protect yourselves against the growing reality of a cyber- - - PowerPoint PPT Presentation

Cyber: Protect yourselves against the growing reality of a cyber- attack Dibble Clark M: +44 17917 623 068 T: +44 1684 878178 F: +44 1684 878171 dibble.clark@3sdl.com What is Cyber? Commercial in Confidence Policy in Action Commercial in


slide-1
SLIDE 1

Cyber: Protect yourselves against the growing reality of a cyber-attack’

slide-2
SLIDE 2
slide-3
SLIDE 3
slide-4
SLIDE 4

Dibble Clark M: +44 17917 623 068 T: +44 1684 878178 F: +44 1684 878171 dibble.clark@3sdl.com

slide-5
SLIDE 5

Commercial in Confidence

What is Cyber?

slide-6
SLIDE 6

Commercial in Confidence

Policy in Action

slide-7
SLIDE 7

Commercial in Confidence

Attack Sophistication versus Intruder Technical Knowledge

slide-8
SLIDE 8

Commercial in Confidence

Topical Issues

  • Data Protection Act
  • Business Continuity
  • Insurance
  • Policy and Standards
  • Customer supply chain management
  • Divestment
slide-9
SLIDE 9

Commercial in Confidence

Managing Risk?

slide-10
SLIDE 10

LIVE HACK DEMO

finditinworcestershire 20150421

slide-11
SLIDE 11

Cyber Essentials

UK Government Recommendation Tom Dold National Cyber Skills Centre, Malvern, Worcestershire

slide-12
SLIDE 12

What is at Risk

 Your Business  Customer and Supplier Confidential Data  Your Reputation  Customer and Supplier Systems  How

 All devices connected to networks  Risks will increase with the “internet of things”  Human Engineering

slide-13
SLIDE 13

Solutions?

slide-14
SLIDE 14

The Five Cyber Essentials Controls

 Firewalls  Access Control  Secure Configuration  Malware  Software Management

14/04/2015 14

slide-15
SLIDE 15

Firewalls

 Firewalls are a front line of defence between the internet and your network,

your systems and your data

 They control traffic passing through them and can prevent people on the

internet from accessing your devices and exploiting vulnerabilities

slide-16
SLIDE 16

Access Control

 Access control ensures that users only have access to data which they are

entitled to access.

 It is particularly important to restrict access to privileged or “admin”

accounts that could allow a malicious actor to install software and bypass controls

slide-17
SLIDE 17

Secure Configuration

 “Out of the box” computers and devices often contain unnecessary software

and default passwords which can make them insecure and vulnerable to cyber threats. Cyber essentials requires these settings to be changed to make systems more secure.

slide-18
SLIDE 18

Malware

 Computers and mobile devices are vulnerable to malicious software

(“malware”), such as viruses. Simple anti-malware software can reduce this risk significantly

slide-19
SLIDE 19

Software Management

 Software frequently contains weaknesses or security vulnerabilities. Software

suppliers release regular updates or “patches” to resolve these weaknesses. Managing the software updates is an important way to reduce cyber risks.

slide-20
SLIDE 20

More Information on Cyber Security?

insights.cyberskillscentre.com

slide-21
SLIDE 21

Your Takeaway?

 There is a real risk lurking out there, don’t get caught out!  Learn more about and get Cyber Essentials

slide-22
SLIDE 22

Questions?

slide-23
SLIDE 23
slide-24
SLIDE 24
slide-25
SLIDE 25