© logicacmg 2006. all rights reserved enabling personal internet security dave martin managing...

6
© LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

Upload: lenard-morton

Post on 26-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

© LogicaCMG 2006. All rights reserved

Enabling Personal Internet Security

Dave Martin

Managing Security Consultant

Page 2: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

2Privacy in Cyberspace

Agenda

30 SecondIntroduction

Current and Emerging Cyberspace Threats

Addressing the Threats – Three Pronged Approach

Page 3: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

3Privacy in Cyberspace

30 Second Introduction

• LogicaCMG

– Worldwide business support company

– 40,000 employees worldwide

– 250+ full time security consultants

– Full boardroom to bytes security service

Page 4: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

4Privacy in Cyberspace

Current and Emerging Cyberspace Threats

• Consumers are exposed to fraud potential

• Viruses, Worms, Trojans, Letter Bombs and more…

• Unacceptable behaviour on-line

• Phishing already a significant problems for consumers

• Penetration of wireless networks

• E-mail interception

• Spear-phishing

Page 5: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

5Privacy in Cyberspace

Education

Government websitesISP campaignsVendor adviceIndustry advice

Tools

Anti-virus & Anti-SpamFirewalls

Patch levelsSecured wireless routers

Global co-operation

Cross border co-operation

Education

Targeted advice to publicTailored advice to public

Tools

Secure e-mailIE7

Behavioural Analytics

Global co-operation

MoU between countries

Addressing the Threats – Three Pronged Approach

Page 6: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

6Privacy in Cyberspace

Summary

• Government to sponsor public awareness

• ISPs to provide customers with toolkit

• Businesses to safeguard their customers’ information

• Consumers to use the tools available

Coherent - Cost-effective - Simple