170 likes | 184 Views
In this session, Kate Kuehn from Senseon Technologies sheds light on the critical equation of Risk + Cost = Security and provides insights into understanding the true impacts of cyber threats. With a focus on C-Suite and cybersecurity, key topics such as the current state of cybersecurity, emerging threats, and the need for a Zero Trust approach are discussed. Participants are encouraged to explore key questions related to cyber maturity modeling, defense strategies, and the shared responsibility in cloud security. Discover how to educate teams, enforce acceptable use policies, and protect critical data in the evolving threat landscape.
E N D
Kate Kuehn Senseon Technologies - US CEO @katekuehn kate@senseon.io Understanding Today’s Threats- A C-level Perspective Security Simplified All people participating in the security ecosystem must understand one basic principle Risk + Cost = Security What is the “cost”of a threat? Opportunity & Capital What is the true impact of understanding? What are the risks your organization faces & what is your role in the risk?
C-Suite & Cybersecurity 1 $200b 57% 48 hours 97% 1000% 1 million
New TeleBots backdoor: First evidence linking Industroyer to NotPetya The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust The headlines today….. The Cybersecurity 202: Kanye West is going to make password security great again Defense industry grapples with cybersecurity flaws in new weapons systems The New Shared Responsibility Model For Cloud Security China is ahead of Russia as 'biggest state sponsor of cyber-attacks on the West' New research generates deepfake video from a single picture
Consider… What ARE the Top Threats? MALWARE Ransomware Distributed denial of service O Trojans CEO fraud or whaling Banker Personal data breach Spyware Software that is intended to damage or disable computers and computer systems Disruptive cyber attack
How are they getting in? Track device location Turn on the camera Sabotage device settings Extract data Steal username & password Capture emails Turn on the microphone
The reality of the threat landscape Increasing complexity of enterprise networks Accelerated tech adoption increases data and noise Attacker innovation and velocity is increasing
Where to start? Cyber Maturity Modeling
How do you educate your teams? Understanding the past is the key to a successful security future… Zone of routine Observable /Manageable Zone of surprise Uncertain / Insurable Zone of catastrophes Rare/Extreme How can we learn from Infrequent but high impact events? What incidents did we not plan for? What are we expecting in a given year?
Your people have POWER Acceptable Use Expense Management Can I block access to risky, unofficial applications? How do I reduce the risk of uncontrolled security costs? What is the usage breakdown of business vs. personal on assets? How exactly is our organization’s data used? How can I enforce acceptable use policies on Wi-Fi? How can I better understand the risk of Shadow IT? How do I make Compliance Policies effective 24/7? How do I protect my users? Content Security to protect data Policy
What are your biggest challenges? Growing complexity Budget concerns Security staff shortage New threats emerging Too many solutions to mange Changing the organisational culture Delivering security improvements Gaining leadership understanding Being sufficiently flexible and responsive Getting the skills and talent you need Adopting a risk-based approach
Do you know how much a cyber attack would cost your organisation? What is your most important infrastructure/information/assets / applications and why? What are your most critical applications and what do you do to test their security? How do you baseline normal and how do you learn from the abnormal? What links do you have with other security/government type organisations? And who are they? Do you know, or audit, or control, the access your partners and third parties have to your critical data? What vetting or legal recourse do you have with your partnership contracts? Do ALL of your users know the value (and risk) of the data asset they are charged with? How big a part do employee behaviours play in your cyber defence strategy? Key questions for your team to consider?
Our endgame…. Good security is something EVERYONE plays a part in. QUESTIONS?