dss.lv @ ibm and also tech workshop in riga, latvia (may, 2016)

Post on 15-Apr-2017

158 Views

Category:

Business

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cyber Security Strategy from technologists perspective

May, 2016

Andris Soroka

Riga, Latvia

“Data Security Solutions” business cardWhat We Do?

DSS

Cyber Security

OnlyFull IT

Security Services Lifecycle

Most Innovative Portfolio in

BalticsMember–

ships, Awareness

Rising

Technology &

Knowledge Transfer

ICT Security

Evangelists

Endpoints

Applications

Networks

Data

Identity

Mobility

Management

Cloud

DSS Delivering Excellent ICT Security Operatitions to its Customers

Customer ICT Security

Operations Excellence

Cooperation with Industry

Top Technology

Leaders Recognised by Gartner, IDC,

Forester

Top level ICT

Security Professiona

ls

Selected Cutting Edge ICT Security Innovative

Technology Integration

Pan-Baltic

Projects

Particular Focus

on Securit

y

Citadele Bank

Citadele Bank

Our international cyber security conference7th annual since 2010

Last year briefly:75+ presentations8 parallel sessions700+ on-site visitors2500+ online watchers20+ countries35 expo stands

http://event.dss.lv

Citadele Bank

Citadele BankChallenges of C-level executives

Predict Business Risk

Detect Insider ThreatsConsolidate & Protect Data

Identify Threats

Stay Compliant

Compliant and secure are two different things....

Compliance does great job to help elevate awareness of security concerns

And also help to enforce minimum baseline standards

However checking right boxes to get through every next audit leaves organization exposed to any new technologically advanced threat, sophisticated targeted attack and so on

If organization has automated risk management (GRC) solution in place that’s also significantly better than a manual teamwork (XLS’s)

Integrated and Intelligent – IBM Security Systems

Citadele BankAnswering all cyber security questions

IBM QRadarSecurity Intelligence

Platform

Network Forensics

Vulnerabilities

Configurations

Flows

Events

LogsAn integrated, unified

architecture in a single web-based console

Traditional SIEM6 products from 6 vendors are needed

IBM SecurityIntelligence and Analytics

INTEGRATED

LogManageme

nt

Security Intelligence

Network Activity

Monitoring

RiskManageme

nt

Vulnerability

Management

Network Forensics

How we can helpAnalyze and detect risksFulfill auditBuild security action planTrain the employeesPass compliance regulationsSave from data leakageProtect critical assetsGet rid of passwordsConsult Your professionalsProtect from attacksHelp creating RFP docs

Be Your IT Security Advisor!

Business value of «Data Security Solutions»

Think Security FirstThank you

top related