less security products more secured products
play

Less Security Products, More Secured Products You are squinting if - PowerPoint PPT Presentation

Less Security Products, More Secured Products You are squinting if you can read this Which is Worst? ERP system down for a week or Customer Data Hacked | slide 2 Less Security Products, More Secured Products You are squinting if you can


  1. Less Security Products, More Secured Products You are squinting if you can read this

  2. Which is Worst? ERP system down for a week or Customer Data Hacked | slide 2

  3. Less Security Products, More Secured Products You are squinting if you can read this

  4. 1. Introduction – Kin Kwan, TELUS Health Agenda 2. What is Cyber Security? 3. Recent News and Trends 4. What Business Analysts Should Know about Cyber Security  Everything Can Be Hacked  Data Sensitivity  Cyber Security is Risk Management  BA is a Technical Liaison  Cyber Security Requirements TELUS Restricted

  5. Exercise #1 https://vimeo.com/29985766 | slide 5

  6. Presenter Security Officer TELUS Health Position Overview • Manage the Information/Cyber Security Program for TELUS Health * Responsibilities • Governance, Risk, and Compliance • Collaborate with TELUS CSO • Internal & External Communication • Don’t get hacked / Demonstrate due-diligence | slide 6 | slide 6

  7. Cyber Threat World Map | slide 7

  8. What is Cyber Security? | slide 8

  9. Exercise #2 | slide 9

  10. Exercise #3 https://www.youtube.com/watch?v=4gR562GW7TI | slide 10

  11. What motivates Hackers? 1.Financial Gain (ransom) 2. Espionage (competition) 3. FIG (fun, ideology, and grudge) 4. Other (errors, glitches, etc.) | slide 11 | slide 11

  12. Cyber Security – Most Targeted Industry 1.PHI/PII is very lucrative (10x) 2. Legacy Equipment (XP) 3. High Impact (Life or Death) 4. Very Connected | slide 12 | slide 12

  13. Cyber Security – Recent News and Trends World’s Biggest Data Breaches | slide 13

  14. Ransomware https://www.youtube.com/watch?v=2sNrhcVGbx0 | slide 14

  15. Ransomware | slide 15

  16. Equifax – 4 th Largest Hack in History What Happened? • Impact - 145.5 million records (8K Canadians) leaked (Full Name, SSN/SIN, BOD, Address, Driver’s License, Credit Cards, Bank Accounts, etc.) • Root Cause: Unpatched application bug (Apache Struts) • Company Impact: • 24% drop in stock price, Q3 earning TBD • CEO, CISO, CIO “retired” Core Lessons • Application security is critical • Layers of Defense is more critical and reinforcement of the “difficult basics” (patching, vulnerability scanning, incident management, etc.) • Compliance driven approach is not adequate - must go above and beyond • Accountability is becoming the new norm • We are all in this together | slide 16 | slide 16

  17. Looking Back at 2017 and Looking Forward at 2018 • Large Data Breaches is becoming the New Norm • More Large Data Breaches •Equifax (145m) • $150 per record •Yahoo (3b) •Uber (57m) • Compliance – GDPR (May 2018), Fines •Nissan Canada (1.13m) and Notification rules •Deloitte •DNC (Trump won) •HBO (GoT) • Market Consolidation - M&A • Security market 50% growth (85m market • Ransomware continue to increase (1b) cap) • Poor security habits continues • Cloud Security remains a top risk • Poor passwords • Lack of patching • People are still the Weakest Link • Out-of-date anti-virus software • Lack of monitoring • Ransomware – “WannaCry” • Legacy systems and application • API • Perimeter is disappearing • IoT (11b) 2017 2018 2018 | slide 17 | slide 17

  18. What BAs Should Know about Cyber Security? Everything Can Be Hacked Data Sensitivity Security is Risk Management BA is a Technical Liaison Cyber Security Requirements | slide 18

  19. Everything Can Be Hacked Know Your Crown Jewels | slide 19 | slide 19

  20. Data Sensitivity Not All Data are Equal | slide 20 | slide 20

  21. Security is Risk Management Don’t Accept the Risk On Your Own!! | slide 21 | slide 21

  22. BA is a Technical Liaison Consult with Privacy and Security Groups Business Cyber Security Ensuring Compliance with Internal Policies and External Regulations (PCI, PIPA) Business Cases and Budgeting | slide 22 | slide 22

  23. Cyber Security Requirements | Secure-by-Design Similar to resilient-by-design or privacy-by-design, secure-by-design specifies that security must be included in the fundamental design of the system, application or solution from the ground up . This differs from current approaches that identify security later and treat it as a layer that can be added to an existing design to make it secure, or a technique that can be applied at a discrete point in the process. | slide 23 | slide 23

  24. Exercise #3 Hawaiian Emergency Management Officials Hold Interview | slide 24

  25. Contact • Kin.Kwan@Hotmail.com • https://www.linkedin.com/in/kinkwan/ | slide 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend