completing the risk picture: adding a business intelligence and collaborative approach to...

19
Completing the Risk Picture: Adding a Business Intelligence and Collaborative Approach to Cybersecurity

Upload: surfwatch-labs

Post on 09-Jun-2015

74 views

Category:

Data & Analytics


2 download

TRANSCRIPT

Page 1: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Completing the Risk Picture:Adding a Business Intelligence and

Collaborative Approach to Cybersecurity

Page 2: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

How Would You Grade Your Cyber Risk Posture Today?

2

Page 3: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

What is the Common Theme?

3

Page 4: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Cyber Events Trickle Up

4

• Small/individual cyber incidents can lead to much more damage

• C-Suite and BoDs are being held responsible

Page 5: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

5

Are You Looking at the Entire Puzzle?

Page 6: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

A Single Lens View is Doomed

• Studying a problem from every angle and every level always leads to more practical solutions and quicker (re)action.

6

Page 7: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

What’s Going On Outside Matters

7

Page 8: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

8

OR

Context is Key

Page 9: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Can You Answer Critical Cyber Risk Questions?

9

Page 10: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

What Does the Financial Industry’s Risk Landscape Look Like?

10

Page 11: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Financial Industry Cyber Risks

11

Page 12: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Learn. Share. Collaborate.

Keeping quiet helps no one…

EXCEPT the bad guys

12

Page 13: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

13

Page 14: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Are You Spending in The Right Areas?

14

Page 15: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Any Change to How You Would Rate Your Cyber Risk Posture Now?

15

Page 16: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

SurfWatch LabsOverview

Page 17: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Cyber Risk Intelligence

17

Who We Are & What We Do•Engineering team led by former US Intelligence Analysts

•Business intelligence approach to cybersecurity

– Massive data warehouse and powerful cyber risk analytics

– Practical “risk-sensing” solutions

•Founded in 2013

•Series A Financing 2014

Page 18: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Additional Resources

18

• Cyber Risk Report – A Look at the 1st Half of 2014http://info.surfwatchlabs.com/Sample-Cyber-Risk-Report

• Whitepaper – Big Data, Big Mess: Cyber Risk Intelligence Through “Complete Context”http://info.surfwatchlabs.com/big-data-security-analytics

• Webinar – Tips to Shore up Cyber Risks in the Supply Chain https://webinar.informationweek.com/18797?keycode=CAA1AC

Page 19: Completing the Risk Picture: Adding a business intelligence and collaborative approach to cybersecurity

Thank You!

www.surfwatchlabs.comFollow us at: