Download - IT Security Summit 2016
IT Security Summit 2016
Protect. Defend. Innovate.
“Securing the cyberspace from the unknown”
What is CyberSecurity?
• The protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
What is a cybercrime?
• Conducted by individuals working alone, or in organized groups, intent on extracting money, data or causing disruption, cyber crime can take many forms, including the acquisition of credit/debit card data and intellectual property, and impairing the operations of a website or service.
What is data breach?
• A security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so
WHAT?
IT Security Summit 2016
Protect. Defend. Innovate.
“Securing the cyberspace from the unknown”
How do I protect my business from cyber attacks?
• Conduct a Security and Self Risk Assessment
• Perform Policy Review and Employee Education
• Preform Penetration Testing & Vulnerability Scanning
How does cyber attacks compromise your network?
• Settles into a system• Tries to hide• Searches out network
vulnerabilities• Disables network security
measures• Infects more endpoints and
other devices• Calls back to command-and-
control (CnC) servers• Waits for instructions to
start extracting data from the network
How do I respond to data breaches?
• Implement an Incident response plan
• Limit data exposure• Notify Business
partners• Manage 3rd party
contracts
HOW?
IT Security Summit 2016
Protect. Defend. Innovate.
“Securing the cyberspace from the unknown”IT Security FACTS 1 2
3 4 5
Living in a digital service dependent world heightens the importance of securing all information in the cyberspace. Be informed, and updated to help secure the cyberspace
YOU ARE A TARGET!Be pro-active! Continuously connect with the cyberspace security experts through the IT Security Summit 2016.