dss.lv @ ibm and also tech workshop in riga, latvia (may, 2016)
TRANSCRIPT
Cyber Security Strategy from technologists perspective
May, 2016
Andris Soroka
Riga, Latvia
“Data Security Solutions” business cardWhat We Do?
DSS
Cyber Security
OnlyFull IT
Security Services Lifecycle
Most Innovative Portfolio in
BalticsMember–
ships, Awareness
Rising
Technology &
Knowledge Transfer
ICT Security
Evangelists
Endpoints
Applications
Networks
Data
Identity
Mobility
Management
Cloud
DSS Delivering Excellent ICT Security Operatitions to its Customers
Customer ICT Security
Operations Excellence
Cooperation with Industry
Top Technology
Leaders Recognised by Gartner, IDC,
Forester
Top level ICT
Security Professiona
ls
Selected Cutting Edge ICT Security Innovative
Technology Integration
Pan-Baltic
Projects
Particular Focus
on Securit
y
Citadele Bank
Citadele Bank
Our international cyber security conference7th annual since 2010
Last year briefly:75+ presentations8 parallel sessions700+ on-site visitors2500+ online watchers20+ countries35 expo stands
http://event.dss.lv
Citadele Bank
Citadele BankChallenges of C-level executives
Predict Business Risk
Detect Insider ThreatsConsolidate & Protect Data
Identify Threats
Stay Compliant
Compliant and secure are two different things....
Compliance does great job to help elevate awareness of security concerns
And also help to enforce minimum baseline standards
However checking right boxes to get through every next audit leaves organization exposed to any new technologically advanced threat, sophisticated targeted attack and so on
If organization has automated risk management (GRC) solution in place that’s also significantly better than a manual teamwork (XLS’s)
Integrated and Intelligent – IBM Security Systems
Citadele BankAnswering all cyber security questions
IBM QRadarSecurity Intelligence
Platform
Network Forensics
Vulnerabilities
Configurations
Flows
Events
LogsAn integrated, unified
architecture in a single web-based console
Traditional SIEM6 products from 6 vendors are needed
IBM SecurityIntelligence and Analytics
INTEGRATED
LogManageme
nt
Security Intelligence
Network Activity
Monitoring
RiskManageme
nt
Vulnerability
Management
Network Forensics
How we can helpAnalyze and detect risksFulfill auditBuild security action planTrain the employeesPass compliance regulationsSave from data leakageProtect critical assetsGet rid of passwordsConsult Your professionalsProtect from attacksHelp creating RFP docs
Be Your IT Security Advisor!
Business value of «Data Security Solutions»
Think Security FirstThank you