1 / 27

Business Continuity In a Digital World

Business Continuity In a Digital World. Larry Bridwell VP Global Security Strategies Grisoft. Introduction.

Download Presentation

Business Continuity In a Digital World

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Business Continuity In a Digital World Larry Bridwell VP Global Security Strategies Grisoft Security Week 2007 Brasil

  2. Introduction • A Business Continuity Plan (BCP) identifies the threats that can affect the continued operation of the business and the actions that will restore business to normal activity in response to these threats. • A business owner or manager needs to put the same priority on protecting the business against Internet or Digital threats as “classical” threats • Business owners and managers must understand NO company is too small to be a target for these Internet-based threats • Examine these digital threats and discover how to mitigate the risk these threats bring Security Week 2007 Brasil

  3. Today’s Topics • The Internet Has Changed Our World • The Internet Has Change Our Businesses • The Internet Has Changed Business Risks • Digital Threats to Business Continuity • Mitigating the Risk of Digital Threats • Summary Security Week 2007 Brasil

  4. The Internet Has Changed our World Security Week 2007 Brasil

  5. The Internet Has Changed our World Security Week 2007 Brasil

  6. The Internet Has Changed our World • >1 billion people globally have access to the Internet • >1 million companies globally = 50% of their revenue • Rapidly becoming the primary source for information • Yahoo: • >250 million mail users; • > 500 million users • Google: • >150 million searches a day; • >67.6 million people visited Google an average of 6.2 12/2006 • last year's revenue was between $60 million and $300 million. • Rapid Growth in Web 2.0 Social Sites • VoIP growth immense and growing Security Week 2007 Brasil

  7. The Internet Has Changed our Offices Security Week 2007 Brasil

  8. The Internet Has Changed our Offices Customers Network Partners Branch Office Desktops Internet Routers Web Servers Modems Servers Telecommuters Wireless Devices Security Week 2007 Brasil

  9. The Internet Has Changed our Business • Extend business hours for sales and customer information to 7x24x365 • Extends business across regional and national borders • Communicate with customers one-on-one through email • Use web sites to advertise a company and its products • Create a whole new sales channel using the Web, in addition to, or sometimes instead of retail stores • Improve employee productivity through tele-commuting • Improve employee efficiency through better internal communications • Drives down the cost for sales by using online stores on web sites • Reducing costs for supplies and services, through increased efficiency and accuracy and wider range of choices via the Web • Eliminating the expense of express services and postal services by using free email and VoIP communications Security Week 2007 Brasil

  10. The Internet Has Changed our RISKS Network Internet Customers Partners Branch Office Desktops Routers Wireless Devices Web Servers Modems Servers TODAY!! Telecommuters Security Week 2007 Brasil

  11. Business Continuity Need • An AT&T study1 found that, “Nearly 1/3 of U.S. businesses do not have emergency continuity plans in place – up from 25% a year earlier. • The survey also found that 2/3 of companies with a disaster lost business • 16% losing between $100,000 and $500,000 per day • 26% saying they did not know how much it cost per day • In another study2 47% of risk managers surveyed said, “Unplanned downtime of information technology systems lasting 24 hours or more could jeopardize the survival of their entire business.” 1Amanda Cantrell, “Is your company prepared? One company's experience, plus tips for preparing.” http://money.cnn.com/2005/10/04/technology/disaster_recovery/index.htmBusiness after disaster 2“Economist Intelligence Unit survey highlights the extreme criticality of IT Systems,” http://www.continuitycentral.com/news03100.htm Security Week 2007 Brasil

  12. Digital Business Continuity Cost Computer Economics Security Week 2007 Brasil

  13. Digital Business Risks • Corporate Espionage • Identity Theft and Fraud • Extortion • Unfair and Deceptive Trade Practices • General Privacy Invasions • Distributed Denial of Services • Loss of Productivity Security Week 2007 Brasil

  14. Viruses • Worms • Trojan Horse or Trojan • Spam/UCE • Spyware • Adware • Bots; Rootkits • Phishing • Backdoors • Hacker Agents/Kits • Malicious Websites • Drive-by download • Yesterday • Written for Fame/Notoriety • Nusiance • Today • Written for PROFIT • Crime • Organized Groups • More Complex Digital Business Threats Malware Motivation Security Week 2007 Brasil

  15. Global Monthly Malware Reports Security Week 2007 Brasil

  16. Brazil Monthly Malware Reports Security Week 2007 Brasil

  17. BOTS: Brazil-Global Security Week 2007 Brasil

  18. Spyware: Brazil-Global Security Week 2007 Brasil

  19. Adware: Brazil-Global Security Week 2007 Brasil

  20. Trojans: Brazil-Global Security Week 2007 Brasil

  21. Consequences of a Cyber Attack What If The Computers In Your Office Gets Infected? • Loss of revenue; personal liability resolution. • Additional operations expenses incurred due to the disruptive event • Financial loss from resolution of violation of contract agreements • Financial loss from resolution of violation of regulatory or compliance requirements And also: • Loss of competitive advantage or market share. • Loss of public confidence or credibility, or incurring public embarrassment. • Think TJX - 45.7 million credit card holders were affected by the data thefts from 2005-2006 Security Week 2007 Brasil

  22. Point Solutions: Firewalls, IDS, AV were considered Security • Security for the Perimeter • Security was Business Reactive • The IT team handled Security • Security team had limited exposure to: • Executive Management • Business Plan • Security managed in Operating Unit • Security Compliance at the IT level • Security looked at with ROI Today • Business require Global Presence • Businesses deal with customers online • Companies must deal with Trusted partners • Compliance drive industry specific solutions • Security must be part of the Corporate business plan • Security is now a process that requires integrated point solutions Yesterday Business Security Needs Have Changed Security Week 2007 Brasil

  23. Who? Security Yesterday When? Executives User Host Protocols Network Domain Applications Lexical IP addresses Sockets Data How? Binary Streams Sessions Files Security Today Documents What? Holistic Information Security Security Week 2007 Brasil

  24. Protect Detect Recover Desktop Firewall Anti-Spyware Data & Systems Anti-Virus Anti-Spam Anti-Phishing Integrated Security             Security Week 2007 Brasil

  25. Identify critical assets • Internal & External • Data • Devices • Networks • Users • Locations IDENTIFY • Assess Security Risks • Analyze: • network perimeter • desktops, notebooks • PDAs, phones, printers • Review policies • Inspect facilities • How much Risk can I afford? • Focus on Risks that Matter ASSURE ASSESS SECURE • Secure Critical Assets • Create Risk Reduction program • Maintain & Manage infrastucture • Assure your security posture Managing the Risks INTELLIGENCE Security Week 2007 Brasil

  26. Summary • Businesses today NEED have a Business Continuity Plan • That Plan MUST consider Digital disruptions • The BCP needs to consider today’s Digital Risks • Today’s Digital Risks demand Holistic approach • Integrated Solutions • Identifying Assets • Assessing Assets • Securing Assets • Assuring acceptable Security Posture • Up to date Intelligence is key • Focus on the Risks that matter! Security Week 2007 Brasil

  27. Thank You! WHEW!! Larry Bridwell P: 717-802-2603 F: 717-828-1082 lbridwell@grisoft.com Security Week 2007 Brasil

More Related