Www.cygnia.co.uk 1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Website Hardening HUIT IT Security | Sep
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
ShareTech 2015 Next-Gen UTM.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
Frontline Enterprise Security
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
MIS323 – Business Telecommunications Chapter 10 Security.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Final Project: Advanced Security Blade IPS and DLP blades.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Predrag Spasic | Sales Manager Serbia and Macedonia
Cyber Security Zafar Sadik
Firmware threat Dhaval Chauhan MIS 534.
Barracuda Web Security Flex
Cybersecurity - What’s Next? June 2017
09 October 2017 COMPULSORY TENDER BRIEFING SESSION: OPEN TENDER : AGSA/14/2017– Appointment of a service provider to render information security managed.
Security Risk Profiles – Tips and Tricks
Capabilities Matrix Access and Authentication
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Matt G change over point ?
IS4550 Security Policies and Implementation
Cisco Dumps PDF Implementing Cisco Network Security RealExamCollection.com.
Download Cisco Exam Dumps - Valid Cisco Question Answers - Dumpsprofessor.com
Cyber Security 2017 Trends and Start Ups.
Identity & Access Management
Securing the Threats of Tomorrow, Today.
Secure once, run anywhere Simplify your security with Sophos
How to Mitigate the Consequences What are the Countermeasures?
Implementing Client Security on Windows 2000 and Windows XP Level 150
(With Hybrid Network Support)
Policies and Procedures to Protect you, your Office and your Data
In the attack index…what number is your Company?
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker

Why have we put this event together? Top 4 Cyber Attack Concerns Ransomware Zero Day Malware Distributed Denial of Service (DDoS) Attacks Hacking

Four of the leading Cyber Security vendors

2006 Nokia 6310i Phone Text Messages 2016 iPhone 6 Phone Text Messages Camera Internet Apps Payment

6 The Change in Threats 2006 Threats and Security Same Security, New Threats Script Kiddies Threats Security Anti-Virus Firewall / VPN Content Filtering IDS / IPS ThreatsSecurity Compromised Users Organised Criminals Business Disruption Anti-virus Firewall / VPN Secure /Web IPS 2016 Mobile Security Vulnerability Scans DDoS Protection Ransomware Sandboxing Virus’s/ Malware “ Digital Graffiti ” Human Error

Who are Cygnia? Cyber Security Specialist £10M turnover Dedicated consultancy and support team of 10 Expert Cyber Security Account Management team Employee Growth Last 12 Months Revenue growth Last 12 Months Customer Retention Rate last Year Support SLA Performance Last 3 Years 25%26%93% 100%

Security Solutions 88 Firewalls (NGFW) Intrusion Prevention Systems VPN - SSL & IPSEC Network Access Control (NAC) Web Application Firewalls Distributed Denial of Service (DDOS) Protection Network Data Leakage Prevention (DLP) Data Governance Secure File Sharing File Integrity Monitoring (FIM) Data Content Filtering (On Premise and Cloud) Web Content Filtering (On Premise and Cloud) Application Control for the Web Zero Day Threat Protection for Web and ad Web Filtering Security Incident and Event Management (SIEM) Network Audit and Compliance Forensics Audit and Compliance Bring Your Own Device (BYOD) Mobile Device Management Hard Drive Encryption USB and Media Control SSL VPN Strong Authentication End Point and Mobile Networ k Data End Point and Mobile & Web Filterin g Audit and Complian ce

Technical Services 99 Consultan cy Support Security Services Managed Service Pre-Sales Advice Proof of Concept Project Planning Installation and Configuration Documentation Auditing Full SLA 24x7 and 9 to 5 Support MS Dynamics support desk SC or DV Cleared Vulnerability Scans Penetration Testing ISO Best Practice Policy Documentation Staff Security Training Firewall SIEM Two Factor Authentication Future - Sandboxing

Cygnia Customers

What’s New for Penetration Testing Wifi – NAC - MDM Managed Services New Technologie s

Agenda 10.00am - Cyber Threat Landscape - Check Point 10.25am - 8 Security Lessons From 8bit Games - Tenable - Vulnerability Scanning 11.00am - Break 11.30am - Cyber Attacks: No One Immune, Few Prepared - Radware – DDoS 12.15am - How Do You Stop Zero Day Attacks and Ransomware? - Check Point – Zero Day Threat Protection – Sandblast 12.45am - What To Do When The Worst Happens - Check Point - Incident Response 1.00pm - Lunch 2.00pm The Complete Threat View -Intel Security – SIEM 2.45pm - The Risk In Your Pocket - Check Point – Mobile Threat Protection 3.15pm - Cygnia – Seminar Close 3.30pm - Williams Museum Tour / FW22 Simulator (Optional) 4 – 5pm – Depart (Simulator Available until 5pm)

About the day No Fire alarms planned Please book at the Cygnia Stand for the Simulator The first break and lunch will be in the adjoining room The final break will be in the Trophy room upstairs The museum tour is after the seminar about 3.30pm The simulator is available until 5pm

Andrew WalkerCarol Coulson Andy Plant Debbie Locker Kristie Drummond Stacie Reed Mike Burns 14 Joining the Dots Tabitha Dunn

15 Questions