repelling the cyber attackers

6
Repelling The Cyber Attackers Presented By: • Suvasmita Rout

Upload: suvasmita-rout

Post on 18-Feb-2017

127 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Repelling The Cyber Attackers

Repelling The

Cyber Attackers

Presented By:• Suvasmita

Rout

Page 2: Repelling The Cyber Attackers

• For many business, the next wave of innovation and growth will likely involve intelligent analytics, rich mobile experiences, and “one touch” processes that require no further manual intervention.

• Success will depend on maintaining trust: consumers and business customers alike will accept nothing less than a complete assurance that the companies they engage with protect their highly sensitive data carefully in the hyper connected information systems powering the digital economy.

• Many also treat cyber security primarily as a technology function rather than integrating it into business operations. As a result, they get the wrong answer about how to construct a cyber security program.

Page 3: Repelling The Cyber Attackers

• The consequences are painfully clear: nearly 80 per cent of technology executives surveyed report that their organizations cannot keep up with the attackers’ increasing sophistication.

• cyber security a control function and toward what we call digital resilience: the ability to design customer applications, business processes, technology architectures, and cyber security defences with the protection of critical information assets in mind.

Page 4: Repelling The Cyber Attackers

Companies need to move beyond cyber security as a control function toward a more integrated and resilient approach.

High

Integrationwith broader IT and businessprocesses

Low Extent of security controls High

13 Digital resilience2014–20

Cyber securityNot a priority

Pre-2007

Cyber security as a control

function2007–13

Page 5: Repelling The Cyber Attackers

Six Critical Actions For To Achieve Digital Resilience:

1. Identify all the issues

2. Aim high but toward a well-defined target

3. Work out how best to deliver the new cyber security system

4. Establish the risk–resource trade-offs

5. Develop a plan that aligns business and technology

6. Ensure sustained business engagement

Page 6: Repelling The Cyber Attackers