Human factor in CyberSecurity

Similar documents
EU General Data Protection Regulation (GDPR) Achieving compliance

BHConsulting. Your trusted cybersecurity partner

Click to edit Master title style. DIY vs. Managed SIEM

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

IBM Security Services Overview

An Aflac Case Study: Moving a Security Program from Defense to Offense

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

BHConsulting. Your trusted cybersecurity partner

Layer Security White Paper

Go Cloud. VMware vcloud Datacenter Services by BIOS

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Background FAST FACTS

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

HOSTED SECURITY SERVICES

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

Secure Access & SWIFT Customer Security Controls Framework

SIEMLESS THREAT DETECTION FOR AWS

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

ISACA West Florida Chapter - Cybersecurity Event

White Paper. How to Write an MSSP RFP

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Hacker Academy UK. Black Suits, White Hats!

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

Unlocking the Power of the Cloud

Insurance Industry - PCI DSS

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Background FAST FACTS

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

locuz.com SOC Services

to Enhance Your Cyber Security Needs

Watson Developer Cloud Security Overview

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

ISE Canada Executive Forum and Awards

Data Sheet The PCI DSS

BUILDING AND MAINTAINING SOC

CORPORATE BUSINESS SOLUTIONS

Certified Cyber Security Specialist

ISE North America Leadership Summit and Awards

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

The Modern SOC and NOC

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

CLOUD COMPUTING READINESS CHECKLIST

Security Information & Event Management (SIEM)

Practical SCADA Cyber Security Lifecycle Steps

Qualys Cloud Platform

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Digital Health Cyber Security Centre

CISO View: Top 4 Major Imperatives for Enterprise Defense

CyberVista Certify cybervista.net

Ransomware A case study of the impact, recovery and remediation events

PT Unified Application Security Enforcement. ptsecurity.com

Cloud Customer Architecture for Securing Workloads on Cloud Services

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

SGS CYBER SECURITY GROWTH OPPORTUNITIES

Why Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

NY State s Cybersecurity Legislation Requirements for Risk Management, Security of Applications, and the Appointed CISO

Cyber Security Technologies

PCI DSS COMPLIANCE 101

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

CYBER SECURITY AIR TRANSPORT IT SUMMIT

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Inside the 6 principal layers of the cloud security ARMOR.COM PAGE PAGE 1 1

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

New World, New IT, New Security

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Managed Security Services - Endpoint Managed Security on Cloud

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

K12 Cybersecurity Roadmap

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Case Manager on Cloud

Service Provider View of Cyber Security. July 2017

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

Everything visible. Everything secure.

Events Management or How to Survive Security Incidents. Belnet Security Conference May 2010

Simplify Your Network Security with All-In-One Unified Threat Management

Why is Office 365 the right choice?

Gujarat Forensic Sciences University

Protect Your End-of-Life Windows Server 2003 Operating System

IaaS Buyer s Checklist.

AKAMAI CLOUD SECURITY SOLUTIONS

egambit Your defensive cyber-weapon system. You have the players. We have the game. TEHTRIS

# ROLE DESCRIPTION / BENEFIT ISSUES / RISKS

PCI DSS Compliance and the Cloud

Must Have Items for Your Cybersecurity or IT Budget in 2018

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Security Awareness Training Courses

Transcription:

Human factor in CyberSecurity how to minimize it and save the money Dmytro Petrashchuk Chief Technology Officer Dmitriy_Petrashchuk@bms-consulting.com

About Ukraine Location: Eastern Europe Population: 45 million Capital: Kyiv (3 million people) Workforce: 22 million Timezone: UTC +2 1000+ IT Companies 100+ R&D Centers 2000+ Startups

Land of CyberSecurity Talents http://www.uadn.net/files/ua_hightech.pdf http://www.sicherheitstacho.eu/

Ukrainian wages and rates https://en.wikipedia.org/wiki/ List_of_European_countries_by_average_wage#Map https://yalantis.com/blog/cost-services-europe-market-research/

BlackEnergy Attack BlackEnergy is a well-known cybercrime toolkit that has been in use since 2007, but in summer 2015, as tensions rose between Russia and Ukraine, a new version of the malware was detected being used by a mysterious group of hackers targeting Ukrainian government officials to harvest information. http://www.ibtimes.co.uk/reporters/david-gilbert BlackEnergy trojan, together with an SSH backdoor and the destructive KillDisk component, which were all detected in several electricity distribution companies in Ukraine, are a dangerous set of malicious tools theoretically capable of giving attackers remote access to a company s network, shutting down critical systems and, by wiping their data, making it harder to get them up and running again. http://www.welivesecurity.com/2016/01/11/blackenergy-and-the-ukrainian-power-outage-what-we-really-know/

About BMS Consulting Managed Security Services Security Solutions Deployment Penetration tests Application Security AntiDDoS & APT protection PCI DSS Compliance ISO 27001:2013 15 years in cybersecurity 60 vendors 500 successful projects 150 professionals 70M+ annual turnover

Facts about CyberSecurity We have to be ready for attack 24x7x365 Former experience is hardly applicable for current landscape 87% EU companies were attacked last year InfoSec budgets grow up 25% per year More than 50% companies have implemented cybersecurity controls Average time-to-compromise 30 min Average time-to-detect 8 months Factors that influence Globalization IoT Industry 4.0 Clouds Mobility Verizon DBIR

CyberSecurity Process in ideal world Asset inventory and documentation Security Improvement and Optimization Information Risk analysis Information Security Awareness Policies, Procedures and Workflows Security Controls design and planning Security Controls implementation

How it works in real world

What CyberSecurity Professionals should do and usually do Expected Detect attacks and misuse Educate users Define policies Manage incidents Minimize risks Evaluate controls Reality Write papers Hate users Fight to IT Protect budget Buy something Hide faults Establish compliance

Outsource Security to External Security Operations Center + Professional support Wide range of services Vulnerabilities, Incidents, Pentests, Controls Management, Forensics 24x7 SLA Difficult to manage Expensive Jurisdiction issues Data protection issues

We offer Professional Managed CyberSecurity Services: Security Intelligence Incident Management Vulnerability Assessment Security Controls Support Penetration testing PCI DSS/ISO27001 Certification IT Forensics Virtual Security Operation Center 24x7x365 support Online portal, tools and services Multilingual staff (incl. German) Robust and customizable SLA Data encryption and multitenancy EU based Datacenter Affordable rates and prices 1 month free trial

Architecture Customer Managed Security Appliance BMS Consulting Team Dedicated Team of Experts Operators Multi-tenant Management Platform Private Cloud cybersecurity tools and data

Standardized Services Objects Services Web-services Network perimeter Corporate Network Diagnostics Vulnerability scan Remediation consulting Check-up scan Surveillance Weekly diagnostic Remediation plan and management Cybersecurity Incident Forensics Guard Full surveillance Security monitoring 24х7 Dedicated CyberSecurity expert support during attacks and incidents Cloud Infrastructure Vulnerability scan Vulnerability management Security Incident Management

Just TRY mssp.bms-consulting.com Mention keyword CeBIT Discount in request form and get 10% discount

Dmytro Petrashchuk, Dmitriy_Petrashchuk@bms-consulting.com Thank you! Let s discuss