24
Cyber Security Landscape Changes, Threats & Challenges

Cyber Security Landscape: Changes, Threats and Challenges

  • Upload
    bloxx

  • View
    569

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Security Landscape: Changes, Threats and Challenges

Cyber Security Landscape Changes, Threats & Challenges

Page 2: Cyber Security Landscape: Changes, Threats and Challenges

Welcome

Mark GibsonGlobal Sales [email protected]

Page 3: Cyber Security Landscape: Changes, Threats and Challenges

Agenda• Who is Bloxx• How has the Landscape

Changed• Threats & Skills Shortage• Best Practice and

Guidance• Moving to the Cloud• Superior Cyber Security

with Bloxx

Page 4: Cyber Security Landscape: Changes, Threats and Challenges

Content Filtering PioneerGlobally Patented TechnologyGrowing Market Share in UK/US/EMEAMultiple Deployment Options Stellar Service and SupportCost Effective Licensing ModelDistribution Model and Support

Who is Bloxx?

Page 5: Cyber Security Landscape: Changes, Threats and Challenges

How has the security landscape changed? • The number of security breaches has increase & the scale and cost has nearly

doubled

• Not as many organisations increased their spending in information security & fewer expected to spend more in the future

• Nearly 9 out of 10 large organisations surveyed now suffer some form of security. Proving we need to adopt a ‘Not If but When’ mantra

• Despite the increase in staff awareness training, people are just as likely to cause a breach as viruses and other types of malicious software

• When looking at drivers for information security expenditure, ‘Protecting

customer information’ and ‘Protecting the organisation’s reputation’ account for over half of the responses

• The trend in outsourcing certain security functions and the use of ‘Cloud computing and storage’ continue to rise.

Page 6: Cyber Security Landscape: Changes, Threats and Challenges

Security breaches levels rise again

Its not IF but When

• 90% of large organisations reported that they had suffered a security breach, up from 81% in 2014.

• Almost three-quarters of SMB’s reported a security breach - an increase on the 2014 and 2013 figures.

* 2015 INFORMATION SECURITY BREACHES SURVEY

Page 7: Cyber Security Landscape: Changes, Threats and Challenges

External vs Internal

Page 8: Cyber Security Landscape: Changes, Threats and Challenges

The Source of the Breach

BYOD still poses significant risk

• Social Media related breaches increase by 1%

• BYOD related breached up 7%

Page 9: Cyber Security Landscape: Changes, Threats and Challenges

Sharp rise in ‘average’ cost of a breach

• £1.46m - £3.14m is the average cost of a breach to a large organisation

• £75k - £311k is the average cost to a small business

Page 10: Cyber Security Landscape: Changes, Threats and Challenges

What impacts the cost of a breach? The average global cost of data breach per lost or stolen record is $154 - with costs varying by industry.

• Healthcare organisation has a breach the average cost could be as high as $363 per record • Education the average cost could be as high as $300 per record

The purchase of insurance can reduce the cost of a data breach.

Insurance protection reduces the cost by $4.4 per record. Significant when we consider the size of some recent breaches.

In the event of a breach, when the Board of Directors take a more active role the average costs can be reduced by $5.5 per record.

Page 11: Cyber Security Landscape: Changes, Threats and Challenges

How are you reacting… • An increase across the

board in the adoption of security awareness training

• Whilst insurance proves to reduce the cost of a breach. A significant decrease in coverage has been reported from both large and small business.

Page 12: Cyber Security Landscape: Changes, Threats and Challenges

The Budget challenge remains…

Securing more with Less?

Security spend is forecast to decrease in both subsets in comparison to last year.

Can this be attributed to a lack of Board Level transparency?

Page 13: Cyber Security Landscape: Changes, Threats and Challenges

Combatting insider threatsInsider threats are difficult to forecast, prepare for and guard against, therefore a balance must be struck between security and trust.

Split security into looking at both infrastructure and people. This ensures that more rigorous measures can be implemented without directly monitoring staff, which can be obtrusive.

Employees need to be aware of the potential risks associated with data and understand the benefits of properly safeguarded data.. Deliver training. Communicate transparently and often

Insider threats don’t only represent malicious attacks, mistakes by staff, although accidental can be detrimental

Page 14: Cyber Security Landscape: Changes, Threats and Challenges

Cyber InsuranceManage Expectations and Choose Wisely Know where you are todayIdentify vulnerabilities, risk management practices and any coverage of cyber attacks that general insurance might provide.

Chart the course forwardsWith these risks in mind, consider what improvements can be made to business structure and employee practices. Insurance is not prevention!

Manage expectationsIdentify the best policy (there are options…) and fully understand the obligations under the selected premium.

Page 15: Cyber Security Landscape: Changes, Threats and Challenges

Devise a robust 360 PolicyHere are out Top three essential security practicesFilterOrganisations of any size must actively monitor what data is being accessed via the web in real-time. Anything less is ineffective and risky.

ProtectBe clear about what the security challenges of personal devices are for the corporate network. These will differ for each company, department and office.

CommunicateEmployees are the greatest line of defence against hackers – be sure that you engage with them regularly to deliver security training and detail the potential ramifications of their actions.

Page 16: Cyber Security Landscape: Changes, Threats and Challenges

Build the right teamThere is a skills shortage – you need to think and act outside the box!

Broaden your horizonsThink about potential candidates you may not usually considerIt is not necessary to have a computer sciences degree before embarking on a career in the field. Skills are transferable, and should be viewed as such

Look withinLook at the IT culture and systems you have in place.Cybersecurity professionals are interested and passionate about technology, so make sure that you are offering tools that they can use effectively and are familiar with

Page 17: Cyber Security Landscape: Changes, Threats and Challenges

Moving to the Cloud?The proof is in the PlanningYou can never plan too much - appreciate that the cloud will add to your existing requirements and that as a result of a cloud deployment, they could well be subject to change  Generate a helicopter view of your security landscape and understand how moving to the cloud will tilt those on their axis

Have a firm grasp on the wider landscape and a ‘realistic’ view on what will and very may well need to change

Understand the security practises of your cloud solution provider & question how often they are tested and by whom

Consider what internal changes need to be made to ensure cloud is an effective and secure component of your IT infrastructure

Page 18: Cyber Security Landscape: Changes, Threats and Challenges

Agile businesses demand flexibility, mobility and speed! All while delivering robust online protection and ensuring compliance.

Tru-View Technology from BloxxIs the only technology that lets you keep pace with the growth of the web! Our patented technology helps secure 800 million devices across the globe.

Tru-View Technology from Bloxx

Page 19: Cyber Security Landscape: Changes, Threats and Challenges

Deliver Superior Cyber Security with Bloxx?

Create safe, flexible and collaborative work environments regardless of location or device

Why Bloxx?• Real Time Content Analysis and Filtering• Certificate-based SSL filtering• Multi Layered email filtering• Single Sign on for BYOD• Multiple Authentication options• Secure mobile workers – regardless of location• Hardware, Virtual and Cloud Deployments

More than leading Security• Ensure compliance with AUP management• Enforce Access policies – across locations• Gain control over bandwidth hungry websites• Manage social media – to increase productivity • Flexible time-based quotas – to manage browsing

Page 20: Cyber Security Landscape: Changes, Threats and Challenges

Much more than Leading Technology• All inclusive pricing for 1 & 3

years• Flexible deployment options • On site or remote installation • Unlimited technical support• POCs and Evaluations Fully

Support • Free product updates• Online, on demand training

portal

Page 21: Cyber Security Landscape: Changes, Threats and Challenges

Safeguard Learning & bolster your eSafety?

Solutions designed with Education in mindWith Bloxx you can Safeguard students regardless of location or device and centrally manage single or multi campus deployments

• Real Time Content Filtering & Analysis• Simplify BYOD with Single Sign On• Multiple Authentication options• Superior Inspection of SSL/HTTPS Traffic• Eliminates Anonymous Proxies • Manage Social Media • Granular Reporting• Easy Access Teacher Portal• Proactive Search Alerts• Central Management

Page 22: Cyber Security Landscape: Changes, Threats and Challenges

Client Focus| Aberdeenshire Council The Bloxx web filtering solution is now used to secure online

activity throughout schools, public libraries and community facilities for:

• Over 48,000 staff and pupils • 230,000 members of the public

Graeme Slapp, Education Project Officer, Aberdeenshire Council

“The difference between Bloxx and our previous solution is night and day. With a much more relevant filtering policy, our schools now feel much more confident in being able to gain access and use online resources.”

Chris Clelland, ICT Business Solutions Manager, Aberdeenshire Council

“Aberdeenshire ICT staff were able to move 165 locations onto Bloxx, giving a marked improvement to the browsing and learning experience. The Tru-View Technology has meant that we do not need to constantly monitor access and block potential holes in our filter lists.”

Page 23: Cyber Security Landscape: Changes, Threats and Challenges

Introducing Tru-View CloudTru-View Cloud from Bloxx delivers real-time web filtering that minimises risk whilst increasing network protection in a cloud environment.

• Real-time content analysis, categorisation and filtering • Full inspection of SSL traffic• Protection against malware, spyware and phishing

attacks• Wide range of authentication methods • Secure filtering clients for Windows, OSX and any device

with proxy capability• Logging and reporting data is automatically transferred

to the main appliance • Connect branch offices & roaming users with no

additional hardware • Centralised policy management

Page 24: Cyber Security Landscape: Changes, Threats and Challenges

www.bloxx.com

Thanks for listening Questions?