the new battle of britain: reset your security
TRANSCRIPT
THE NEW BATTLE OF BRITAIN:RESET YOUR SECURITY
1
Etienne GreeffChief Executive Officerwww.secdata.com
2
THE STRATEGIC SECURITY CONUNDRUM
*Data from Canalys and Verizon, 2013
Security spend continues to increase
2017$30.1 billion
2012$22 billion
2006$9.6 billion
…but so does the number of security breaches• 621 reported
in the last 12 months
• Up 23% over the past 3 years
We are not winning the arms race
At the same time, CEOs expect IT to cost less
But we expect availability, integrity and confidentiality
3
WE KNOW SECURITY IS CHANGING
Threats are more sophisticated, evolving and on the rise
Enhanced regulatory environment driving cost and complexity
Cloud, mobility and consumerisation are becoming mainstream
THREATS REGULATION IT CONSUMPTION
4
WE KNOW BUSINESSES ARE CHANGING
Remote accessMobile workers
CloudBYOD
IT consumption is changing You can’t build a defensive wall around your organisation anymore
BYOA
5
BUT SECURITY TEAMS ARE PARALYSED
Distracted by high-profile threats
Overwhelmed by system complexity
Facing conflicting security requirements
Limited investment has to address all security requirements
Focused on new technologies
Talent shortage and expert resource scarcity
WE NEED A DIFFERENT APPROACH
6
SECUREDATA STRATEGY
OUR VISION AND BELIEFS
8
Secure customer enablement
We aim to enable our customers to use the Internet, cloud computing and business applications to their full potential in a secure way by providing relevant security solutions and services
We focus on minimising customer downtime and business disruption and solving business challenges through expert agnostic consultancy and security solutions development and service delivery
We enable security professionals to say ‘yes’ to business needs in a flexible and secure way
Our beliefs
Every business is a security customer
It is important to look at the complete picture to ensure the infrastructure is available and secure
Point solutions alone won’t solve security problems
Solutions must be future-proofed to deal with the evolving threat landscape
Security services partners should offer transparent pricing and complete visibility of all operations
COMPLETE SECURITY FRAMEWORK
9
Understand the assets
you are trying to protect
Implement methods to
detect threats and
vulnerabilities
Apply this knowledge to
protect valuable assets
Employ contingency and incident
response practices
COMPLETE SECURITY PROCESS
10
1. Identify valuable assets
2. Identity what the risks are
3. Decide which risks to Accept, Mitigate,
Manage or Ignore
1. Mitigate known
risks with early threat
detection2. Manage
unknown risk with proactive detection
1. Integrate knowledge into protection strategy
2. Tune device features to protect identified assets
3. Use real-time feedback to enhance protection
1. Develop an
incident response
plan2. Take
specialist advice for
faster resolution
3. Develop response toolkits
THREATINTELLIGENCE METRICS
RISK ASSESSMENT
REMEDIATION
BUSINESS CASE
IN-HOUSE OR MSP?
COMPLETE SECURITY SERVICES
11
Complete proactive security
SecureData Operations Centre + SecureData Labs
CAPABILITIES AND APPROACH
12
Technical expertise
• 60+ certified technical experts, including SC cleared
• 24x7x365 manned Security Operations Centre
• ISO 27001 – throughout the entire organisation
• PCI QSAC – Qualified Security Assessors
• ISO 9001 / BS7799 certified throughout
• IL2 and IL3 accredited SOC
• Strict adherence to ITIL v3 service management best practices
• Accredited UK government Public Services Network (PSN) provider
• AffinitySecure is our cloud-based 24x7x365 real-time monitoring platform
• We offer real-time threat intelligence across our customer base
• Over 5000 devices under management, enabling proactive threat detection for customers
• 20% of logged calls are generated through AffinitySecure monitoring
• We monitor customer infrastructures for Confidentiality, Integrity and Availability, far beyond most monitoring tools and platforms
AffinitySecure Service-centric
• 95% customer contract renewal rate
• 71% of customers would recommend SecureData (Net Promoter Score survey 2013)
• Dedicated service and account managers focus on enabling business solutions that solve customer challenges
• Technical guardians keep customers in touch with technology innovations
• We work hard to partner with customers, and offer flexibility to customisation options
• Our staff have the desire to do the best possible job every time
WHY THIS MATTERS
BUSINESS VALUE THROUGH SECURITY
14
Less issues in future
Improved availability
and reduced
downtime
Early warning detection
Governance, risk and
compliance
Controlled mitigation
Complete visibility
over issues
Use big data and
visualisation to provide
threat intelligence
Improve IT & business
agility
Because you want to
say ‘yes’