how to stop wasting money and start managing cybersecurity

36
www.cytegic.com Company Confidential This presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice. How to Stop Wasting Money and Start Managing Cybersecurity Cytegic January 2015

Upload: cytegic

Post on 07-Aug-2015

115 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: How to stop wasting money and start managing cybersecurity

www.cytegic.com

Company ConfidentialThis presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice.

How to Stop Wasting Money and Start Managing CybersecurityCytegicJanuary 2015

Page 2: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 2

Outline1. Introduction

2. Current state of affairs

3. What is needed to improve the situation

4. Case Study

5. About Us

6. Q&A

Page 3: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 3

Shay Zanadni CISSP, CISA, CISM, CRISCCurrent position- Cytegic CEO

Experience:

• Renowned cyber-security expert

• Established and led IAF Information Warfare division

• ISACA President (Israeli chapter)

• Former CEO - PricewaterhouseCoopers GRMS IL

Education

• EMBA, Northwestern University

•M.Sc, Computer Science, Open University of Israel

Page 4: How to stop wasting money and start managing cybersecurity

www.cytegic.com

Current state of affairs

Page 5: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

• Organizations spend more than $67 billion on IT security

• Yet, 97 % Have Been Breached…

It’s a bloodbath out there…

Page 6: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Most of Executive dissatisfied with state of IT security management

• Executive do not feel they are being kept fully informed regarding the state of their IT security

• The majority of directors are dissatisfied with the quantity of information management provides about cybersecurity and IT risk (Security Risk: Value Report)

Most of Executive dissatisfied with state of IT security management

We’re putting all this complexity on their shoulders and then it’s just ‘Good luck!’ ”John Kindervag, Forrester

Page 7: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

75% of CIOs expect to increase spending on Security in 2015

Page 8: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

But- increased spending does not equal increase security

Security level

Spending

Optimum

Page 9: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 9

Challenges of Cybersecurity management

Too much data,Not enough information

Evolving threat landscape

Increased Public pressure to

secure personal information

Requirement to maximize

cybersecurity investment

Adoption of new

technologies (Mobile, Cloud)

Page 10: How to stop wasting money and start managing cybersecurity

www.cytegic.com

A different solution is needed …

Page 11: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 11

First- define your assets

IP Customer data

Employees data

Reputation Money Infrastructure

Page 12: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 12

Continuously Monitor your securityposture and asses maturity

Security Data Collection

Extraction & Processing

Best PracticeAnalysis

MaturityAssessment

Page 13: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 13

Continuously Monitor your securityposture and asses maturity

Page 14: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 14

Continuously Monitor your securityposture and asses maturity

Page 15: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 15

Monitor Threat landscape, analyze and forecast

BehaviorProfiling

Forecasting& Prediction

Mass Data Collection Analysis

Page 16: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 16

Monitor Threat landscape, analyze and forecast

Page 17: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Correlate Threats and Control Vectors

Threat & ControlsCorrelation

Page 18: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Simulate to determine optimal resource allocation

Simulation &Optimization

Page 19: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Present recommendations and reports

Page 20: How to stop wasting money and start managing cybersecurity

www.cytegic.com

Case Study

Page 21: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 22

Case Study - Retail: The challenge Know Your Adversary

Measure Threat Level

Increase Readiness

Page 22: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Asset definition

Employee details Sensitive Business

information Reputation Credit Card

details

Page 23: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Control Definition

24

Page 24: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Intelligence forecasting

25

Summary of financial attack methods during the end of the year and the holiday season (Retail sector, N. America Geopol)

Page 25: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Attacker and Attack Methods

26

Page 26: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Prioritization and Optimization

27

Page 27: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential

Assets and threats Correlation (for executives)

28

Page 28: How to stop wasting money and start managing cybersecurity

www.cytegic.com

Summary

Page 29: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 30

Summary Disturbing rise in threats quantity,

complexity and diversity

Raise in cybersecurity expense follows.. but with very little success in mitigating the threats

A Risk-based approached is required

Readiness is only possible by correlating between threats and security measures to determine effective resource allocation

Page 30: How to stop wasting money and start managing cybersecurity

www.cytegic.com

About Cytegic

Page 31: How to stop wasting money and start managing cybersecurity

To become the preferred, unified solution for all cybersecurity management needs, including monitoring, intelligence and decision making.

Our Vision

Page 32: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 33

Business Focus

Cytegic develops a full suite of cyber management and decision-support products that enable cybersecurity professionals to monitor, measure and manage organizational cyber-security resources.

Page 33: How to stop wasting money and start managing cybersecurity

| Proprietary & Confidential 34

Cytegic Key Strengths Reliable, Adaptive Technology

− Big Data analytics technology with adaptive interfaces

Feature Rich Product Suite− Full coverage: Intelligence, Monitoring and Risk Assessment

Industry Expertise− Deep understanding of IT security decision making needs

Smooth and Rapid Deployment− Instant access to raw system data for controls/subsystems

Page 34: How to stop wasting money and start managing cybersecurity

QUESTIONS & ANSWERS

Page 35: How to stop wasting money and start managing cybersecurity

THANK YOUThis presentation brought to you by Cytegic Ltd

Page 36: How to stop wasting money and start managing cybersecurity

Contact Information

www.cytegic.com

CEO

+ 972-54-5651277 [email protected]

Shay Zandani

Photo