1 / 6

Enabling Personal Internet Security

Enabling Personal Internet Security. Dave Martin Managing Security Consultant. Agenda. 30 Second Introduction Current and Emerging Cyberspace Threats Addressing the Threats – Three Pronged Approach. 30 Second Introduction. LogicaCMG Worldwide business support company

tao
Download Presentation

Enabling Personal Internet Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enabling Personal Internet Security Dave Martin Managing Security Consultant

  2. Agenda 30 SecondIntroduction Current and Emerging Cyberspace Threats Addressing the Threats – Three Pronged Approach

  3. 30 Second Introduction • LogicaCMG • Worldwide business support company • 40,000 employees worldwide • 250+ full time security consultants • Full boardroom to bytes security service

  4. Current and Emerging Cyberspace Threats • Consumers are exposed to fraud potential • Viruses, Worms, Trojans, Letter Bombs and more… • Unacceptable behaviour on-line • Phishing already a significant problems for consumers • Penetration of wireless networks • E-mail interception • Spear-phishing

  5. Addressing the Threats – Three Pronged Approach Education Government websites ISP campaigns Vendor advice Industry advice Tools Anti-virus & Anti-Spam Firewalls Patch levels Secured wireless routers • Global co-operation • Cross border co-operation • Education • Targeted advice to public • Tailored advice to public • Tools • Secure e-mail • IE7 • Behavioural Analytics • Global co-operation • MoU between countries

  6. Summary • Government to sponsor public awareness • ISPs to provide customers with toolkit • Businesses to safeguard their customers’ information • Consumers to use the tools available Coherent - Cost-effective - Simple

More Related