Presentation is loading. Please wait.

Presentation is loading. Please wait.

Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security.

Similar presentations


Presentation on theme: "Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security."— Presentation transcript:

1 Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

2 Outline  Background  Defence in Depth  Securing a network  Risk vs Reward  Predictive Intelligence  Education and awareness

3 Ontario Government  60,000 plus OPS employees  2,300 locations  27 ministries  IT  Corporate CIO, CTO, CPO  8 CIOs

4 Ontario GO-Net  94,000 emails accounts  Thousands of devices connected to the network  Cyber Security Branch  24/7 Ops Centre, forensics, IAM, risk management, security design, compliance, penetration testing, education & awareness, engagement

5 Defence In Depth Cyber Security Architecture TRAs Policies & Directives Industry Standards Security Appliances Anti- Virus Penetration Tests Operations Centre CompliancePatch Mgmt User Education Collaboration

6 How Cyber Security Is Viewed

7 How Cyber Security Should Be Viewed  Business Enabler  Partner

8 Translate to the C-Suite  Need to stop being technical  Simplify things  And…

9 Layers of Security Securing a House Architectural Standards Safety Practices Access Control Deterrent Emergency Response

10 Layers of Security Securing a Network Architectural Standards Safety Practices Access Control Deterrent Emergency Response IDS IPS

11 Risk Vs Reward  Cyber security is a business risk and must be treated just like any other business risk  Risk must be managed and balanced against potential rewards  C, I, A  Example 1  Example 2

12 Value of OPS Information Holdings Information TypeWho Cabinet confidence informationOrganized crime Budget InformationNation states Tax and health recordsHactivists Police and Justice informationOrganized crime Natural Resources (Ring of Fire)Others wanting to gain economic advantage Intellectual propertyOthers wanting to gain economic advantage

13 Predictive Intelligence  Using intelligence to predict where you will attacked next  Understand the threat  Threat = Capability + Intent  What is happening in your environment  Example 1

14 Intelligence Sources  Log files  Collaboration  Subscription and vendor services  Others?

15

16 Education and Awareness  Double edged sword  End user  Frequency  Message  Medium

17 Messaging  Offer to brief business units  Cyber Security Awareness Month

18 Weekly Themes Week 1Week 2Week 3Week 4Week 5 What is Cyber Security Cyber Security Threats Protections and Safeguards Working Together to Keep us Safe Safety Online at Home

19 Parting Thought  The CISO is a catalyst for change. We can enable business to meet their objectives while maintaining security  We are their partners

20 Questions/Discussion

21 CISOs know that to be truly secure, they must adopt a defence in depth approach to cyber security. But is this enough? This presentation will describe the components of defence in depth and then discuss what steps the CISO should consider to take their organization’s cyber security to the next level. This includes partnering with business units on risk management, predictive intelligence and an aggressive cyber security awareness program. 16/05/2015


Download ppt "Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security."

Similar presentations


Ads by Google