will your business get hacked - hull (apr 28)
TRANSCRIPT
1
2
James Burchell
Senior Sales Engineer
Will your business get hacked?
3
Large Companies
81%£600k - £1.5m
Small Companies
60%£65k - £115k
Large Companies
90%£1.46m - £3.14m
Small Companies
75%£75k - £311k
4
2016: The year of the bigger problems?
5
www.informationisbeautiful.net
6
4,000 data breaches in 3 yearsComputing.co.uk
Over 170 law firms investigated in 1 year
Computing.co.uk
All major UK banks and lenders reported data breaches
Computing.co.uk
¾ of customers would reconsider using a company
Computing.co.uk
Who’s to blame?
7
Nearly 300,000 customers lostComputing.co.uk
159,959 accounts compromisedComputing.co.uk
Total cost £40- £45 million Computing.co.uk
£15 million lost in trading valueComputing.co.uk
BT picked up 40% of unhappy customers
Computing.co.uk
8
Spending on IT Security and Documenting Security Policies Is Increasing
…Is the TOP Priority For CIOs…
Top 3 priorities
Modernization innovation
#2
Cloud mobility
#3
Information Security Is a Priority For Top Management…
Cyber security /IT security
#1
…Increasing the Spend On Security Projects in All Categories
YoY increase in spend in external IT projects
Spending growth expectations in January 2015
Source: PWC Source: Morgan Stanley research
Responses to rising risks
2014 2015
Source: Grant Thornton survey
Note:1. Large organizations and small businesses consist of enterprises with >250 employees and <50 employees respectively, priority levels for medium sized businesses (50-249 employees) are similar to those for small businesses
(1)
(1)
9
10
Complexity nightmare of Endpoint and Network
Security Analytics
• Multiple incompatible interfaces• Resource intensive• Manual integration• Dependent upon human analysis• Manual Threat/Incident response• Extra products that are unaware of each other• Manual correlation• Support nightmare
Traditional firewall
Email gateway
Web gateway
NG Firewall
Sandbox
Network Behaviour Analytics
SIEM
Traditional anti-malware
Encryption
Web, Device and App Control
“Next Generation” Detection
“Next Generation” Remediation
“Next Generation” Prevention
11
5.5 million things connected every day
1
20
15
10
5
Billi
ons
2001 20202014
1.2B
20.8B
6.4B
2016
12
Embedded systems
Consumer technologies
Operational systemsMobile devices
New security landscape
36%
2015
30%29%
26%
24%
2014
13% 11% 10%
13
The fragility of privacy
14
Safe Harbour
15
“For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe.”Tim Cook, CEO of Apple
16
Up to 35% would Sell company information
Computing.co.uk
17
Passwords…
1. 1234562. password3. 123456784. qwerty5. 12345
6. 1234567897. football8. 12349. 123456710. baseball
11. welcome 12. 123456789013. abc12314. 11111115. 1qaz2wzx
16. dragon17. master18. monkey19. letmein20. login
18
“Two things are infinite: The universe and human stupidity, and I’m not so sure about the former.”
- Albert Einstein
19
Understanding vulnerabilities
User error
Flaws
Features
20
Trends
Security Breaches on the rise
21
Firewall
Web
Wireless
Reducing the threat - Protect
Endpoint
Encryption
Server
MobileInsight & Analysis
Better Protection
Intelligence Sharing
21
22
IT Controls
Configuration
Visibility
22
Reducing the threat - Control
23
Reducing the threat - Educate
Passphrases not passwords
Think before you click
Verify the call
24
Layered defense & automation
Analytics
Next-Gen Firewall
Wireless
Web
Disk Encryption
UTM
File Encryption
Endpoint
Next-Gen Endpoint
Mobile
Server
Cloud Intelligence
Centralized Policy Management
25© Sophos Ltd. All rights reserved.