repelling the cyber attackers
TRANSCRIPT
![Page 1: Repelling The Cyber Attackers](https://reader036.vdocuments.us/reader036/viewer/2022082523/58a76e6f1a28ab99238b5377/html5/thumbnails/1.jpg)
Repelling The
Cyber Attackers
Presented By:• Suvasmita
Rout
![Page 2: Repelling The Cyber Attackers](https://reader036.vdocuments.us/reader036/viewer/2022082523/58a76e6f1a28ab99238b5377/html5/thumbnails/2.jpg)
• For many business, the next wave of innovation and growth will likely involve intelligent analytics, rich mobile experiences, and “one touch” processes that require no further manual intervention.
• Success will depend on maintaining trust: consumers and business customers alike will accept nothing less than a complete assurance that the companies they engage with protect their highly sensitive data carefully in the hyper connected information systems powering the digital economy.
• Many also treat cyber security primarily as a technology function rather than integrating it into business operations. As a result, they get the wrong answer about how to construct a cyber security program.
![Page 3: Repelling The Cyber Attackers](https://reader036.vdocuments.us/reader036/viewer/2022082523/58a76e6f1a28ab99238b5377/html5/thumbnails/3.jpg)
• The consequences are painfully clear: nearly 80 per cent of technology executives surveyed report that their organizations cannot keep up with the attackers’ increasing sophistication.
• cyber security a control function and toward what we call digital resilience: the ability to design customer applications, business processes, technology architectures, and cyber security defences with the protection of critical information assets in mind.
![Page 4: Repelling The Cyber Attackers](https://reader036.vdocuments.us/reader036/viewer/2022082523/58a76e6f1a28ab99238b5377/html5/thumbnails/4.jpg)
Companies need to move beyond cyber security as a control function toward a more integrated and resilient approach.
High
Integrationwith broader IT and businessprocesses
Low Extent of security controls High
13 Digital resilience2014–20
Cyber securityNot a priority
Pre-2007
Cyber security as a control
function2007–13
![Page 5: Repelling The Cyber Attackers](https://reader036.vdocuments.us/reader036/viewer/2022082523/58a76e6f1a28ab99238b5377/html5/thumbnails/5.jpg)
Six Critical Actions For To Achieve Digital Resilience:
1. Identify all the issues
2. Aim high but toward a well-defined target
3. Work out how best to deliver the new cyber security system
4. Establish the risk–resource trade-offs
5. Develop a plan that aligns business and technology
6. Ensure sustained business engagement
![Page 6: Repelling The Cyber Attackers](https://reader036.vdocuments.us/reader036/viewer/2022082523/58a76e6f1a28ab99238b5377/html5/thumbnails/6.jpg)