how to stop wasting money and start managing cybersecurity
TRANSCRIPT
www.cytegic.com
Company ConfidentialThis presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice.
How to Stop Wasting Money and Start Managing CybersecurityCytegicJanuary 2015
| Proprietary & Confidential 2
Outline1. Introduction
2. Current state of affairs
3. What is needed to improve the situation
4. Case Study
5. About Us
6. Q&A
| Proprietary & Confidential 3
Shay Zanadni CISSP, CISA, CISM, CRISCCurrent position- Cytegic CEO
Experience:
• Renowned cyber-security expert
• Established and led IAF Information Warfare division
• ISACA President (Israeli chapter)
• Former CEO - PricewaterhouseCoopers GRMS IL
Education
• EMBA, Northwestern University
•M.Sc, Computer Science, Open University of Israel
www.cytegic.com
Current state of affairs
| Proprietary & Confidential
• Organizations spend more than $67 billion on IT security
• Yet, 97 % Have Been Breached…
It’s a bloodbath out there…
| Proprietary & Confidential
Most of Executive dissatisfied with state of IT security management
• Executive do not feel they are being kept fully informed regarding the state of their IT security
• The majority of directors are dissatisfied with the quantity of information management provides about cybersecurity and IT risk (Security Risk: Value Report)
Most of Executive dissatisfied with state of IT security management
We’re putting all this complexity on their shoulders and then it’s just ‘Good luck!’ ”John Kindervag, Forrester
| Proprietary & Confidential
75% of CIOs expect to increase spending on Security in 2015
| Proprietary & Confidential
But- increased spending does not equal increase security
Security level
Spending
Optimum
| Proprietary & Confidential 9
Challenges of Cybersecurity management
Too much data,Not enough information
Evolving threat landscape
Increased Public pressure to
secure personal information
Requirement to maximize
cybersecurity investment
Adoption of new
technologies (Mobile, Cloud)
www.cytegic.com
A different solution is needed …
| Proprietary & Confidential 11
First- define your assets
IP Customer data
Employees data
Reputation Money Infrastructure
| Proprietary & Confidential 12
Continuously Monitor your securityposture and asses maturity
Security Data Collection
Extraction & Processing
Best PracticeAnalysis
MaturityAssessment
| Proprietary & Confidential 13
Continuously Monitor your securityposture and asses maturity
| Proprietary & Confidential 14
Continuously Monitor your securityposture and asses maturity
| Proprietary & Confidential 15
Monitor Threat landscape, analyze and forecast
BehaviorProfiling
Forecasting& Prediction
Mass Data Collection Analysis
| Proprietary & Confidential 16
Monitor Threat landscape, analyze and forecast
| Proprietary & Confidential
Correlate Threats and Control Vectors
Threat & ControlsCorrelation
| Proprietary & Confidential
Simulate to determine optimal resource allocation
Simulation &Optimization
| Proprietary & Confidential
Present recommendations and reports
www.cytegic.com
Case Study
| Proprietary & Confidential 22
Case Study - Retail: The challenge Know Your Adversary
Measure Threat Level
Increase Readiness
| Proprietary & Confidential
Asset definition
Employee details Sensitive Business
information Reputation Credit Card
details
| Proprietary & Confidential
Control Definition
24
| Proprietary & Confidential
Intelligence forecasting
25
Summary of financial attack methods during the end of the year and the holiday season (Retail sector, N. America Geopol)
| Proprietary & Confidential
Attacker and Attack Methods
26
| Proprietary & Confidential
Prioritization and Optimization
27
| Proprietary & Confidential
Assets and threats Correlation (for executives)
28
www.cytegic.com
Summary
| Proprietary & Confidential 30
Summary Disturbing rise in threats quantity,
complexity and diversity
Raise in cybersecurity expense follows.. but with very little success in mitigating the threats
A Risk-based approached is required
Readiness is only possible by correlating between threats and security measures to determine effective resource allocation
www.cytegic.com
About Cytegic
To become the preferred, unified solution for all cybersecurity management needs, including monitoring, intelligence and decision making.
Our Vision
| Proprietary & Confidential 33
Business Focus
Cytegic develops a full suite of cyber management and decision-support products that enable cybersecurity professionals to monitor, measure and manage organizational cyber-security resources.
| Proprietary & Confidential 34
Cytegic Key Strengths Reliable, Adaptive Technology
− Big Data analytics technology with adaptive interfaces
Feature Rich Product Suite− Full coverage: Intelligence, Monitoring and Risk Assessment
Industry Expertise− Deep understanding of IT security decision making needs
Smooth and Rapid Deployment− Instant access to raw system data for controls/subsystems
QUESTIONS & ANSWERS
THANK YOUThis presentation brought to you by Cytegic Ltd