Presentation is loading. Please wait.

Presentation is loading. Please wait.

Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.

Similar presentations


Presentation on theme: "Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security."— Presentation transcript:

1 Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security

2 Agenda  Why Should We Care?  The View from the Top  Risk Management or Business Enablement  Case Study

3 Why Should We Care? 3

4 Data Breaches

5 // Source of Data Breaches Source: Verizon Business Data Breach Report Verizon Business 2013 Data Breach Report

6 // Timeline of a Breach Source: Verizon Data Breach Report 2015 In 60% of cases, attackers are able to compromise an organization within minutes.

7 How are breaches identified? Source: Verizon Business Data Breach Report Only 3% of breaches were detected with common security controls

8 The View from the Top 8

9 Business View Of Information Security How does this fit into our business strategy? Why do we have to change our passwords every month? You can’t impact our network latency! What is the Return on Investment? Two Factor Authentication takes too long! Isn’t that too difficult for our clients?

10 Risk Management or Business Enablement? 10

11 Question 11

12 Key Business Drivers For Risk Management  Regulatory Compliance  Maintain Continuity  Prevent Financial Loss  Detect Unauthorized Access

13 Key Business Drivers For Business Enablement  Protect Brand Reputation  Contractual Obligations  Third Party Vendor Audits  Expanded Business Opportunities

14 Case Study 14

15 Healthcare Services Company  Develop an Information Security Strategy  Focus on how to protect the business and its data  Develop strategy based on the risk to sensitive data  Align regulatory compliance standards with information security strategy  Develop and implement policies, standards, and procedures to support the Information Security Strategy  Integrate policies, standards, and procedures into regular business processes  Develop and Test an Incident Response Plan  Plan should include detecting, responding to and limiting the effects of an information security event

16 Questions? Mike Childs Office: 888.712.9531 x711 mike.childs@rooksecurity.com www.rooksecurity.com


Download ppt "Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security."

Similar presentations


Ads by Google