ANNUAL CPD BOARD CONFERENCE Data Protection in Practice 6 & 13 DECEMBER 2016
There are only two types of companies: those that have been hacked, and those that will be. Robert Mueller, FBI Director There are only two types of companies: those that have been hacked and those that don t know they have been hacked. John Chambers, Cisco CEO 2
AGENDA A practical guide to cyber security Technology controls for keeping information secure Using technology to deliver productivity and efficiency Recovering from a cyber breach 3
A Practical Guide to Cyber Security 4
KEEPING IT SYSTEMS SAFE & SECURE 1. Assess the threats and risks to your business 2. Apply technology controls 3. Secure data in the office and on the move 5
KEEPING IT SYSTEMS SAFE & SECURE 4. Secure your data in the cloud 5. Back up your data 6. Train your staff 6
KEEPING IT SYSTEMS SAFE & SECURE 7. Monitor for problems 8. Know what you should be doing 9. Minimise your data 7
KEEPING IT SYSTEMS SAFE & SECURE 10. Make sure your IT department or service provider is doing what they should be 8
Technology Controls for Keeping Information Secure 9
FIREWALL Security services Intrusion prevention system (IPS) Anti virus Application layer filtering Content filtering Remote access / VPN Intrusion detection system (IDS) 10
ANTI VIRUS Real-time file system protection Media scanning (USB) Personal firewall Website reputation filtering 11
ACCESS CONTROLS / PASSWORD POLICY Password length Password complexity Password expiration Password history Multi factor authentication (MFA or 2FA) 12
MOBILE DEVICE MANAGEMENT Phones Laptops Tablets USB Keys 13
BACK UP AND RECOVERY Backup Disaster Recovery Business Continuity Recovery Point Objective (RPO) Recovery Time Objective (RTO) 14
Using Technology to Deliver Productivity and Efficiency 15
MICROSOFT OFFICE 365 Authoring Mail & Social Sites & Content Management Chat, Meetings & Voice Analytics Word Excel Outlook Exchange OneDrive SharePoint Skype for Business Power BI Delve Analytics PowerPoint Yammer Delve OneNote Secure and Compliant Manageable Extensible Always up to date 16
MOBILITY IS THE NEW NORMAL 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more mobile operating systems to support in 2017** >80% of employees admit to using non-approved software-as-a-service (SaaS) applications in their jobs*** * Forrester Research: BT Futures Report: Info workers will erase boundary between enterprise & consumer technologies, ** Gartner Source: Press Release, http://www.gartner.com/newsroom/id/2213115 *** http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report
WHAT'S DRIVING CHANGE? User Devices Apps Data IT
EMPOWERING ENTERPRISE MOBILITY Enable your users People-centric approach Protect your data Devices Apps Data Unify your environment
ONE USER. ONE IDENTITY. EVERYWHERE. Mobile Device & Application Management Consistent identity Self-service for your people Hybrid Identity Access & Information Protection Security / audit reporting Single sign-on to applications Desktop Virtualization
DEVICE CHOICE. SIMPLIFIED MANAGEMENT. Mobile Device & Application Management Managed productivity with Office mobile apps Mobile app management and app wrapping Hybrid Identity Access & Information Protection Conditional access to corporate resources Simplified device enrollment Desktop Virtualization
Recovering from a Cyber Breach 22
MOST COMMON CAUSES OF DATA LOSS Accidental data deletion Theft or loss of data Viruses and malware Equipment failure Coffee / tea Fire / flooding / office loss Power failure 23
CRISIS MANAGEMENT LIFECYCLE Readiness Response Recovery Simulation Real-Time Response Post Crisis Response Post Crisis Assessment 24
Three in every ten firms subject to attack 50% increase in cyber attacks reported by Irish law firms in the past year 25
QUESTIONS? CONTACT US: Michael Redmond Technical Operations Manager Gavin O Donovan CFO (01) 215 3999 or (053) 948 4113 ask@innovate.ie www.innovate.ie 26