march 2019
play

March 2019 An A2Z Tech Presentation page 1 Digital Transformation - PowerPoint PPT Presentation

Successful Digital Transformation whilst Protecting Against Cyber Fraud March 2019 An A2Z Tech Presentation page 1 Digital Transformation an example An A2Z Tech Presentation page 1 The Key Challenges An A2Z Tech Presentation page 2 The


  1. Successful Digital Transformation whilst Protecting Against Cyber Fraud March 2019 An A2Z Tech Presentation page 1

  2. Digital Transformation an example An A2Z Tech Presentation page 1

  3. The Key Challenges An A2Z Tech Presentation page 2

  4. The Resulting Cyber Security Challenges • Evolving traditional security to focus on data, people and risks Aligning and making security integral to the digital journey • Protection is no longer enough • Prevention • • Education • Anticipation Fallout – post breach • Evolution of approach to cyber • Most breaches will have targeted individuals • • Securing the perimiter is not enough anymore An A2Z Tech Presentation page 3

  5. The Resulting Cyber Security Challenges Good practices Regular assessments, diagnostics and audits • Cyber security Essentials & Plus • Strategy must focus on data, risks and People • An A2Z Tech Presentation page 4

  6. Recent examples Stuxnet – industrial system attack • Attacking critical infrastructure • Telecom company – theft of personal info • • Fined £400,000 Reputation damage • Ransomware • NHS crippled by ransomware • Globally 200,000 computers across 150 countries • Questions to ask • Where is data held • Cyber crime is probably the biggest risk to organisations • Annual costs anything between £300 to £400 billion • • ICO – GDPR Are Processes documented • 72 hour rule • An A2Z Tech Presentation page 5

  7. Final thoughts Organisations maturity in terms of cyber and digital transformation • Ask questions • Has org considered tech, people, processes and regulation • Data, Privacy and protection • Big data shouldn’t mean bigger problems • Approach to Security • • Balance between security and functionality Security at relevant places • Are processes in place to deal with breaches and incidents • Culture and awareness • • Education of staff Testing of security • Well documented systems and digital assets • An A2Z Tech Presentation page 6

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend