Will Your Business Get Hacked - Hull (Apr 28)

Preview:

Citation preview

1

2

James Burchell

Senior Sales Engineer

Will your business get hacked?

3

Large Companies

81%£600k - £1.5m

Small Companies

60%£65k - £115k

Large Companies

90%£1.46m - £3.14m

Small Companies

75%£75k - £311k

4

2016: The year of the bigger problems?

5

www.informationisbeautiful.net

6

4,000 data breaches in 3 yearsComputing.co.uk

Over 170 law firms investigated in 1 year

Computing.co.uk

All major UK banks and lenders reported data breaches

Computing.co.uk

¾ of customers would reconsider using a company

Computing.co.uk

Who’s to blame?

7

Nearly 300,000 customers lostComputing.co.uk

159,959 accounts compromisedComputing.co.uk

Total cost £40- £45 million Computing.co.uk

£15 million lost in trading valueComputing.co.uk

BT picked up 40% of unhappy customers

Computing.co.uk

8

Spending on IT Security and Documenting Security Policies Is Increasing

…Is the TOP Priority For CIOs…

Top 3 priorities

Modernization innovation

#2

Cloud mobility

#3

Information Security Is a Priority For Top Management…

Cyber security /IT security

#1

…Increasing the Spend On Security Projects in All Categories

YoY increase in spend in external IT projects

Spending growth expectations in January 2015

Source: PWC Source: Morgan Stanley research

Responses to rising risks

2014 2015

Source: Grant Thornton survey

Note:1. Large organizations and small businesses consist of enterprises with >250 employees and <50 employees respectively, priority levels for medium sized businesses (50-249 employees) are similar to those for small businesses

(1)

(1)

9

10

Complexity nightmare of Endpoint and Network

Security Analytics

• Multiple incompatible interfaces• Resource intensive• Manual integration• Dependent upon human analysis• Manual Threat/Incident response• Extra products that are unaware of each other• Manual correlation• Support nightmare

Traditional firewall

Email gateway

Web gateway

NG Firewall

Sandbox

Network Behaviour Analytics

SIEM

Traditional anti-malware

Encryption

Web, Device and App Control

“Next Generation” Detection

“Next Generation” Remediation

“Next Generation” Prevention

11

5.5 million things connected every day

1

20

15

10

5

Billi

ons

2001 20202014

1.2B

20.8B

6.4B

2016

12

Embedded systems

Consumer technologies

Operational systemsMobile devices

New security landscape

36%

2015

30%29%

26%

24%

2014

13% 11% 10%

13

The fragility of privacy

14

Safe Harbour

15

“For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe.”Tim Cook, CEO of Apple

16

Up to 35% would Sell company information

Computing.co.uk

17

Passwords…

1. 1234562. password3. 123456784. qwerty5. 12345

6. 1234567897. football8. 12349. 123456710. baseball

11. welcome 12. 123456789013. abc12314. 11111115. 1qaz2wzx

16. dragon17. master18. monkey19. letmein20. login

18

“Two things are infinite: The universe and human stupidity, and I’m not so sure about the former.”

- Albert Einstein

19

Understanding vulnerabilities

User error

Flaws

Features

20

Trends

Security Breaches on the rise

21

Firewall

Web

Email

Wireless

Reducing the threat - Protect

Endpoint

Encryption

Server

MobileInsight & Analysis

Better Protection

Intelligence Sharing

21

22

IT Controls

Configuration

Visibility

22

Reducing the threat - Control

23

Reducing the threat - Educate

Passphrases not passwords

Think before you click

Verify the call

24

Layered defense & automation

Analytics

Next-Gen Firewall

Wireless

Web

Email

Disk Encryption

UTM

File Encryption

Endpoint

Next-Gen Endpoint

Mobile

Server

Cloud Intelligence

Centralized Policy Management

25© Sophos Ltd. All rights reserved.