Upload
yotam-gutman
View
249
Download
3
Embed Size (px)
Citation preview
www.cytegic.com
Company ConfidentialThis presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for anypurpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of theinformation in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend,supplement or otherwise alter the information without prior notice.
How to Stop Wasting Money and Start
Managing Cybersecurity
CytegicJanuary 2015
| Proprietary & Confidential
Outline
2
1. Introduction
2. Current state of affairs
3. What is needed to improve the situation
4. Case Study
5. About Us
6. Q&A
| Proprietary & Confidential 3
Shay Zanadni CISSP, CISA, CISM, CRISCCurrent position- Cytegic CEO
Experience:
• Renowned cyber-security expert
• Established and led IAF Information Warfare division
• ISACA President (Israeli chapter)
• Former CEO - PricewaterhouseCoopers GRMS IL
Education
• EMBA, Northwestern University
•M.Sc, Computer Science, Open University of Israel
| Proprietary & Confidential
• Organizations spend more than $67 billion on IT security
• Yet, 97 % Have Been Breached…
It’s a bloodbath out there…
| Proprietary & Confidential
Most of Executive dissatisfied with state of IT security management
• Executive do not feel they are being kept fully informed regarding the state of their IT security
• The majority of directors are dissatisfied with the quantity of information management provides about cybersecurity and IT risk (Security Risk: Value Report)
Most of Executive dissatisfied with state of IT security management
We’re putting all this complexity on their shoulders and then it’s just ‘Good luck!’ ”John Kindervag, Forrester
| Proprietary & Confidential
But- increased spending does not equal increase security
Security level
Spending
Optimum
| Proprietary & Confidential
Challenges of Cybersecurity management
9
Too much data,Not enough information
Evolving threat landscape
Increased Public pressure to
secure personal information
Requirement to maximize
cybersecurity investment
Adoption of new
technologies (Mobile, Cloud)
| Proprietary & Confidential
First- define your assets
11
IP Customer data
Employees data
Reputation Money Infrastructure
| Proprietary & Confidential
Continuously Monitor your securityposture and asses maturity
12
Security Data Collection
Extraction & Processing
Best PracticeAnalysis
MaturityAssessment
| Proprietary & Confidential
Monitor Threat landscape, analyze and forecast
15
BehaviorProfiling
Forecasting& Prediction
Mass Data Collection Analysis
| Proprietary & Confidential
Simulate to determine optimal resource allocation
Simulation &Optimization
| Proprietary & Confidential
Case Study - Retail: The challenge
22
Know Your Adversary
Measure Threat Level
Increase Readiness
| Proprietary & Confidential
Asset definition
Employee details
Sensitive Business information Reputation
Credit Card details
| Proprietary & Confidential
Intelligence forecasting
25
Summary of financial attack methods during the end of the year and the holiday season (Retail sector, N. America Geopol)
| Proprietary & Confidential
Summary
30
Disturbing rise in threats quantity, complexity and diversity
Raise in cybersecurity expense follows.. but with very little success in mitigating the threats
A Risk-based approached is required
Readiness is only possible by correlating between threats and security measures to determine effective resource allocation
To become the preferred, unified solution forall cybersecurity management needs, includingmonitoring, intelligence and decision making.
Our Vision
| Proprietary & Confidential
Business Focus
33
Cytegic develops a full suite of cybermanagement and decision-supportproducts that enable cybersecurityprofessionals to monitor, measure andmanage organizational cyber-securityresources.
| Proprietary & Confidential
Cytegic Key Strengths
34
Reliable, Adaptive Technology− Big Data analytics technology with adaptive interfaces
Feature Rich Product Suite− Full coverage: Intelligence, Monitoring and Risk Assessment
Industry Expertise− Deep understanding of IT security decision making needs
Smooth and Rapid Deployment− Instant access to raw system data for controls/subsystems