how to protect your assets from cyber attacks
TRANSCRIPT
How to Protect Your Assets From Cyber Attacks
1 8 T H J a n 2 0 1 7
P R E S E N T E D B Y :
Sean Ball, Forfusion
Community HashtagHow to Protect Your Assets from Cyber Attacks
#CyberSecurityNE
IT is a risky business…
It’s all about Risk MitigationHow to Protect Your Assets from Cyber Attacks
The Risk of Being Left BehindHow to Protect Your Assets from Cyber Attacks
Digital Transformation on a Massive ScaleHow to Protect Your Assets from Cyber Attacks
Which one are you?How to Protect Your Assets from Cyber Attacks
Newcastle Tops the Wrong LeagueHow to Protect Your Assets from Cyber Attacks
What does a Hacker Look Like?How to Protect Your Assets from Cyber Attacks
Cyber Security Faux Pas - TalkTalk How to Protect Your Assets from Cyber Attacks
Cyber Security is a Board Level IssueHow to Protect Your Assets from Cyber Attacks
TalkTalk Share Price Plummet How to Protect Your Assets from Cyber Attacks
Source: SC Magazine UK
TalkTalk Share Price Plummet How to Protect Your Assets from Cyber Attacks
Source: Google Finance
TalkTalk BrandIndex DipHow to Protect Your Assets from Cyber Attacks
Source: YouGov
How to Protect Your Assets from Cyber Attacks
Source: FireEye Research
• 75% are likely to stop
purchasing from a company if
a data breach was found to be
linked to the board failing to
prioritise cyber security.
Consumer Attitudes to Cyber Security
How to Protect Your Assets from Cyber Attacks
Source: FireEye Research
• 52% would consider paying
more for the same products
or services from a provider
with better data security.
Consumer Attitudes to Cyber Security
How to Protect Your Assets from Cyber Attacks
Source: FireEye Research
• 59% would take legal action
against companies if a data
breach resulted in their
personal details being used
for criminal purposes.
Consumer Attitudes to Cyber Security
How to Protect Your Assets from Cyber Attacks
Source: FireEye Research
• 90% expect to be informed
within 24 hours if their
supplier had suffered a data
breach which could have
compromised their data.
Consumer Attitudes to Cyber Security
20001990 1995 2005 2010 2015 2020
Viruses1990–2000
Worms2000–2005
Spyware and Rootkits2005–Today
APTs CyberwareToday +
Hacking Becomesan Industry
Sophisticated Attacks, Complex Landscape
Phishing, Low Sophistication
The Industrialisation of HackingHow to Protect Your Assets from Cyber Attacks
Designed to evade and reconstitute
Exploit Server
User Proxy Server Status Server Master Server
Requests page
Referred toProxy server
Proxy server gets data from Exploit server
Exploit server sends HTTPrequests to status server
Rollup of logdata pushed to master serverStatus server tracks
HTTP requests/status
Professional Attack Infrastructure - RansomwareHow to Protect Your Assets from Cyber Attacks
Check vuln 1
Check vuln 2
Vuln 3 success!✖✔✔
Patched?
User Exploit Server✖✔✔
Exploit KitsHow to Protect Your Assets from Cyber Attacks
How Data Breaches HappenHow to Protect Your Assets from Cyber Attacks
Cyber Crime in the UKHow to Protect Your Assets from Cyber Attacks
National Cyber Security StrategyHow to Protect Your Assets from Cyber Attacks
Stay on the Right TrackHow to Protect Your Assets from Cyber Attacks
Classify DataHow to Protect Your Assets from Cyber Attacks
Health Check Your Supply ChainHow to Protect Your Assets from Cyber Attacks
Draft and Regularly Update an Incident Response Plan (IRP)How to Protect Your Assets from Cyber Attacks
Get Visibility!How to Protect Your Assets from Cyber Attacks
Typical Visibility
Cisco® Services
Basicvisibility
Thre
ats
User
s
Web
App
licat
ions
Appl
icatio
n Pr
otoc
olsFi
le Tr
ansf
ers
Mal
ware
Com
man
d an
d Co
ntro
l Ser
vers
Clie
nt A
pplic
atio
nsNe
twor
k Se
rver
sOpe
ratin
g Sy
stem
sRo
uter
s an
d Sw
itche
sM
obile
Dev
ices
Prin
ters
VoIP
Pho
nes
Virtu
al M
achi
nes
Superior Network VisibilityHow to Protect Your Assets from Cyber Attacks
Proof of Value Risk Reports Free of Charge
Free Threat Scan Risk ReportHow to Protect Your Assets from Cyber Attacks
Network Report Attack Report Advance Malware Report
Contextual Visibility of your NetworkHow to Protect Your Assets from Cyber Attacks
Opportunity to DifferentiateHow to Protect Your Assets from Cyber Attacks
Thank YouGet a Free Threat Scan Reportwww.forfusion.com/security