36
www.cytegic.com Company Confidential This presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice. How to Stop Wasting Money and Start Managing Cybersecurity Cytegic January 2015

Cytegic how to stop wasting money and start managing cybersecurity final

Embed Size (px)

Citation preview

www.cytegic.com

Company ConfidentialThis presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for anypurpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of theinformation in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend,supplement or otherwise alter the information without prior notice.

How to Stop Wasting Money and Start

Managing Cybersecurity

CytegicJanuary 2015

| Proprietary & Confidential

Outline

2

1. Introduction

2. Current state of affairs

3. What is needed to improve the situation

4. Case Study

5. About Us

6. Q&A

| Proprietary & Confidential 3

Shay Zanadni CISSP, CISA, CISM, CRISCCurrent position- Cytegic CEO

Experience:

• Renowned cyber-security expert

• Established and led IAF Information Warfare division

• ISACA President (Israeli chapter)

• Former CEO - PricewaterhouseCoopers GRMS IL

Education

• EMBA, Northwestern University

•M.Sc, Computer Science, Open University of Israel

www.cytegic.com

Current state of affairs

| Proprietary & Confidential

• Organizations spend more than $67 billion on IT security

• Yet, 97 % Have Been Breached…

It’s a bloodbath out there…

| Proprietary & Confidential

Most of Executive dissatisfied with state of IT security management

• Executive do not feel they are being kept fully informed regarding the state of their IT security

• The majority of directors are dissatisfied with the quantity of information management provides about cybersecurity and IT risk (Security Risk: Value Report)

Most of Executive dissatisfied with state of IT security management

We’re putting all this complexity on their shoulders and then it’s just ‘Good luck!’ ”John Kindervag, Forrester

| Proprietary & Confidential

75% of CIOs expect to increase spending on Security in 2015

| Proprietary & Confidential

But- increased spending does not equal increase security

Security level

Spending

Optimum

| Proprietary & Confidential

Challenges of Cybersecurity management

9

Too much data,Not enough information

Evolving threat landscape

Increased Public pressure to

secure personal information

Requirement to maximize

cybersecurity investment

Adoption of new

technologies (Mobile, Cloud)

www.cytegic.com

A different solution is needed …

| Proprietary & Confidential

First- define your assets

11

IP Customer data

Employees data

Reputation Money Infrastructure

| Proprietary & Confidential

Continuously Monitor your securityposture and asses maturity

12

Security Data Collection

Extraction & Processing

Best PracticeAnalysis

MaturityAssessment

| Proprietary & Confidential 13

Continuously Monitor your securityposture and asses maturity

| Proprietary & Confidential 14

Continuously Monitor your securityposture and asses maturity

| Proprietary & Confidential

Monitor Threat landscape, analyze and forecast

15

BehaviorProfiling

Forecasting& Prediction

Mass Data Collection Analysis

| Proprietary & Confidential

Monitor Threat landscape, analyze and forecast

16

| Proprietary & Confidential

Correlate Threats and Control Vectors

Threat & ControlsCorrelation

| Proprietary & Confidential

Simulate to determine optimal resource allocation

Simulation &Optimization

| Proprietary & Confidential

Present recommendations and reports

www.cytegic.com

Case Study

| Proprietary & Confidential

Case Study - Retail: The challenge

22

Know Your Adversary

Measure Threat Level

Increase Readiness

| Proprietary & Confidential

Asset definition

Employee details

Sensitive Business information Reputation

Credit Card details

| Proprietary & Confidential

Control Definition

24

| Proprietary & Confidential

Intelligence forecasting

25

Summary of financial attack methods during the end of the year and the holiday season (Retail sector, N. America Geopol)

| Proprietary & Confidential

Attacker and Attack Methods

26

| Proprietary & Confidential

Prioritization and Optimization

27

| Proprietary & Confidential

Assets and threats Correlation (for executives)

28

www.cytegic.com

Summary

| Proprietary & Confidential

Summary

30

Disturbing rise in threats quantity, complexity and diversity

Raise in cybersecurity expense follows.. but with very little success in mitigating the threats

A Risk-based approached is required

Readiness is only possible by correlating between threats and security measures to determine effective resource allocation

www.cytegic.com

About Cytegic

To become the preferred, unified solution forall cybersecurity management needs, includingmonitoring, intelligence and decision making.

Our Vision

| Proprietary & Confidential

Business Focus

33

Cytegic develops a full suite of cybermanagement and decision-supportproducts that enable cybersecurityprofessionals to monitor, measure andmanage organizational cyber-securityresources.

| Proprietary & Confidential

Cytegic Key Strengths

34

Reliable, Adaptive Technology− Big Data analytics technology with adaptive interfaces

Feature Rich Product Suite− Full coverage: Intelligence, Monitoring and Risk Assessment

Industry Expertise− Deep understanding of IT security decision making needs

Smooth and Rapid Deployment− Instant access to raw system data for controls/subsystems

QUESTIONS & ANSWERS

THANK YOUThis presentation brought to you by Cytegic Ltd

Contact Information

www.cytegic.com

CEO

+ 972-54-5651277 [email protected]

Shay Zandani