hello gavin dennis information security consultant
play

! Hello! Gavin Dennis Information Security Consultant Symptai - PowerPoint PPT Presentation

Cyber-Attack and Security: PUTTING THE AUDIT COMMITTEE ON HIGH ALERT ! Hello! Gavin Dennis Information Security Consultant Symptai Consulting Ltd. & OpenWave Information Security Ltd. LETS FOCUS ON 1 EVERYONE IS IMPORTANT IN


  1. Cyber-Attack and Security: PUTTING THE AUDIT COMMITTEE ON HIGH ALERT !

  2. Hello! Gavin Dennis Information Security Consultant Symptai Consulting Ltd. & OpenWave Information Security Ltd.

  3. LET’S FOCUS ON… 1 EVERYONE IS IMPORTANT IN SECURITY 2 MAKE OR BUY, WHICH IS MORE FEASIBLE 3 EMPHASIZE BUSINESS IMPACT AND VALUE

  4. 2016 INTERNATIONAL STATISTICS THREAT DATA COMPROMISED ACTORS 239 21,239 = 58 = 1% WERE INCIDENTS INCIDENTS OF ATTACKS 41% 62% INVOLVED CONFIRMED TARGETED PER DAY ARE EXTERNAL PERSONAL BREACHES PUBLIC SUCCESSFUL PARTIES SERVICES 41% SECRETS 14% CREDENTIALS Source: Verizon DBIR 2017 9% MEDICAL

  5. 2016 LOCAL INCIDENT STATISTICS Senior Advisor in the Ministry of Science, Energy and Technology, Trevor Forrest “The country lost US $100M ( J$12.8B ) due to cyber criminal activity” “…more than 230,000 threats were detected in the space of a month.” SOURCE: JIS (http://jis.gov.jm/everyone-risk- cybercrime) 230K x 12 months = 2.76M INCIDENTS p/yr Published: October 12, 2017 1% of 2.76M = 27.6K BREACHES PER DAY

  6. EXAMPLE – YAHOO – 1 BILLION Source: THE HACKER USERS NEWS

  7. EXAMPLE – EQUIFAX - 143M PII DATA Source: http://www.fox5dc.com EQUIFAX IS A CONSUMER CREDIT REPORTING AGENCY

  8. CORE AREAS ANALYSED IN DBIR 2017 PUBLIC ADMINISTRATION WAS A TOP VICTIM IN 7 OF 8 MAIN CATEGORIES Web Crimeware Cyber Denial Application Espionage of Attacks Service Insider and Miscellaneous Payment Card Physical Privilege Errors Skimmers Theft and Misuse Loss

  9. TRUE STORY

  10. 6 - 1 - PLAN REPEAT AUDIT PROCES 5 - 2 - CLOSE EXECUTE S 4 - FOLLOW- 3 - UP REPORT

  11. 1 PLAN

  12. EMPOWER YOUR TEAM!

  13. 2 EXECUTE

  14. IT being uncooperative 1 Source: THE HACKER NEWS 2 IT pressed for resources Security not treated with 3 priority

  15. AUDITS TO CONSIDER Security Baseline Patch Audit Identifies missing patches Assessments e.g. ISO 27K Password Audit Configuration Audit Tests for weak Checks for weak passwords. configurations

  16. 3 REPORT

  17. MEASURE AUDITEES’ MATURITY LEVEL 5 - OPTIMIZE 1 - INITIAL 3 - DEFINED 2 - 4 - MANAGED REPEATABLE

  18. 4 FOLLOW- UP

  19. 5 CLOSE

  20. 6 REPEAT

  21. Q&A! EXPRESS YOURSELF

  22. Thank You wholeheartedly ! Now go forth and be great!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend