1 / 17

Understanding Today’s Threats- A C-level Perspective

Kate Kuehn Senseon Technologies - US CEO @katekuehn kate@senseon.io. Understanding Today’s Threats- A C-level Perspective. Security Simplified. All people participating in the security ecosystem must understand one basic principle Risk + Cost = Security. What is the “cost”of a threat?

cristinal
Download Presentation

Understanding Today’s Threats- A C-level Perspective

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Kate Kuehn Senseon Technologies - US CEO @katekuehn kate@senseon.io Understanding Today’s Threats- A C-level Perspective Security Simplified All people participating in the security ecosystem must understand one basic principle Risk + Cost = Security What is the “cost”of a threat? Opportunity & Capital What is the true impact of understanding? What are the risks your organization faces & what is your role in the risk?

  2. C-Suite & Cybersecurity 1 $200b 57% 48 hours 97% 1000% 1 million

  3. New TeleBots backdoor: First evidence linking Industroyer to NotPetya The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust The headlines today….. The Cybersecurity 202: Kanye West is going to make password security great again Defense industry grapples with cybersecurity flaws in new weapons systems The New Shared Responsibility Model For Cloud Security China is ahead of Russia as 'biggest state sponsor of cyber-attacks on the West' New research generates deepfake video from a single picture

  4. Who are the bad guys?

  5. Consider… What ARE the Top Threats? MALWARE Ransomware Distributed denial of service O Trojans CEO fraud or whaling Banker Personal data breach Spyware Software that is intended to damage or disable computers and computer systems Disruptive cyber attack

  6. When are you most at risk?

  7. How are they getting in? Track device location Turn on the camera Sabotage device settings Extract data Steal username & password Capture emails Turn on the microphone

  8. The reality of the threat landscape Increasing complexity of enterprise networks Accelerated tech adoption increases data and noise Attacker innovation and velocity is increasing

  9. Where to start? Cyber Maturity Modeling

  10. How do you educate your teams? Understanding the past is the key to a successful security future… Zone of routine Observable /Manageable Zone of surprise Uncertain / Insurable Zone of catastrophes Rare/Extreme How can we learn from Infrequent but high impact events? What incidents did we not plan for? What are we expecting in a given year?

  11. Your people have POWER Acceptable Use Expense Management Can I block access to risky, unofficial applications? How do I reduce the risk of uncontrolled security costs? What is the usage breakdown of business vs. personal on assets? How exactly is our organization’s data used? How can I enforce acceptable use policies on Wi-Fi? How can I better understand the risk of Shadow IT? How do I make Compliance Policies effective 24/7? How do I protect my users? Content Security to protect data Policy

  12. Economics of cyberdefense_

  13. What are your biggest challenges? Growing complexity Budget concerns Security staff shortage New threats emerging Too many solutions to mange Changing the organisational culture Delivering security improvements Gaining leadership understanding Being sufficiently flexible and responsive Getting the skills and talent you need Adopting a risk-based approach

  14. The Impact of Ignorance.

  15. Do you know how much a cyber attack would cost your organisation? What is your most important infrastructure/information/assets / applications and why? What are your most critical applications and what do you do to test their security? How do you baseline normal and how do you learn from the abnormal? What links do you have with other security/government type organisations? And who are they? Do you know, or audit, or control, the access your partners and third parties have to your critical data? What vetting or legal recourse do you have with your partnership contracts? Do ALL of your users know the value (and risk) of the data asset they are charged with? How big a part do employee behaviours play in your cyber defence strategy? Key questions for your team to consider?

  16. Our endgame…. Good security is something EVERYONE plays a part in. QUESTIONS?

More Related