Cyber Security What’s really going on in ‘Cyber space’ & Why security matters Gary Hibberd Managing Director of Agenci & Cyber Geek

Slides:



Advertisements
Similar presentations
How to put in place a compliance plan
Advertisements

The Statutory Role of the Chief Executive and Monitoring Officer.
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
Mercury Payment Systems Dan Osby Director, Technical Services Technical Lead, Incident Response
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Session 1 An introduction to compliance. 1 Contents The compliance maze OFR and SRA Handbook Cost of compliance COLP and COFA Compliance arrangements.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Information Security tools for records managers Frank Rankin.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Protecting Data, Sharing Information Graham Wakerley: Director
Payment Card Industry (PCI) Rules and Standards
Law Firm Data Security: What In-house Counsel Need to Know
Information Technology Acceptable Use An Overview
Performing Risk Analysis and Testing: Outsource or In-house
Making the Connection ISO Master Class An Overview.
CPA Gilberto Rivera, VP Compliance and Operational Risk
Your security risk is higher than ever.
Payment card industry data security standards
Cybersecurity - What’s Next? June 2017
CISI – Financial Products, Markets & Services
Team 4 – Mack, Josh, Felicia, Kevin and Walter
What you need to know About Title I
The Internal Audit Role in assessing Cybersecurity
HOW WILL CYBER THREATS AFFECT THE FINANCIAL ADVICE INDUSTRY.
Data Compromises: A Tax Practitioners “Nightmare”
How to build a good reputation online
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Lecture 14: Business Information Systems - ICT Security
Joe, Larry, Josh, Susan, Mary, & Ken
Today’s Risk. Today’s Solutions. Cyber security and
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Risks & Reality Cyber Security Risks & Reality
Andy Hall – Cyber & Tech INSURANCE Specialist
Digital Learning in Portree Primary School
Risk of the Internet At Home
International Organization International Organization
Cyber Security Why You Should Care.
Join In Be Secure Presentation
is not secure is not secure..
LifeBridge Health Sinai Hospital Orientation.
Network Security Best Practices
By Joseph Carnevale, CIP Partner & Director of Sales
CompTIA Security+ Study Guide (SY0-401)
Data Protection Managing risk is not just about health and safety and insurance. It’s about data protection too. New stricter data protection legislation.
Teaching our children the safe and responsible use of ALL technology.
Contact Center Security Strategies
Module 2: Legal and Ethical Issues
Here are some good questions to start out the presentation:
Rule of Law SS.7.C.1.9 Define the rule of law and recognize its influence on the development of the American legal, political, and governmental systems.
Drew Hunt Network Security Analyst Valley Medical Center
Shannon Salter, Chair BCCAT Symposium: User Testing on a Shoestring October 16, 2018.
International Organization International Organization
Business Compromise and Cyber Threat
Computer Security By: Muhammed Anwar.
International Organization International Organization
International Organization International Organization
Financial (cyber) Security
Employee Cybersecurity Program
Dark Web Domain Status Report
What is an anonymous reporting hotline?
BTEC Level 3 Health and Social Care
NYSE Blue Security Concerns for Offset Registries
WTF… About the unsecurity of IoT
Cloud Computing for Wireless Networks
Presentation transcript:

Cyber Security What’s really going on in ‘Cyber space’ & Why security matters Gary Hibberd Managing Director of Agenci & Cyber Geek ghibberd@theagenci.com T: 0744 7911 742 www.TheAgenci.com

WARNING The following slideshow contains some stories which viewers may find uncomfortable and unsettling. Those of a nervous disposition may want to nervously look at their phones for the next 30 minutes.

I Cyber

A Brief History of Cyber … 1975 1989 1995 2000 2005 2007 2010 1986 1993 1996 2004 2006 2008 2013

2015 Cars 1.2 Billion Internet Users 3.2 billion People 7.4 billion 25 20 15 10 5 Cars 1.2 Billion (GreenCarReports) Internet Users 3.2 billion (Internetlivestats) People 7.4 billion (WorldOMeters) Devices 25 billion (Gartner)

“Cybercriminals are actively and passively targeting SME’s ” You need to know… “Cybercriminals are actively and passively targeting SME’s ”

The ‘Real Web’

World Wide Web 5% The Deep Web 95% The Dark Web

SilkRoad “It’s like eBay for lunatics, gun enthusiasts, drug users, criminal gangs, small time arms dealers and some very interesting people.” – FBI Operative.

SRA Principles uphold the rule of law and the proper administration of justice; act with integrity; not allow your independence to be compromised; act in the best interests of each client; provide a proper standard of service to your clients; behave in a way that maintains the trust the public places in you and in the provision of legal services; comply with your legal and regulatory obligations and deal with your regulators and ombudsmen in an open, timely and co-operative manner; run your business or carry out your role in the business effectively and in accordance with proper governance and sound financial and risk management principles; run your business or carry out your role in the business in a way that encourages equality of opportunity and respect for diversity; and protect client money and assets. PRINCIPAL 8 … But if you don’t feel you are… then get in touch with me…. We provide a handy ‘’Cheat Sheet for Cyber Security’ which is available from us… Just email me and I’ll send you a copy

For more information … read The ‘Spiders web’ published 2014 …

Protecting yourselves From Cyber Bugs and Thugs! © The Common Sense Guide - 2016 By Gary Hibberd 1 -Baseline your security regularly to understand your state of readiness, and so that you can interpret the symptoms that could lead to a cyber incident. 2- Make it personal to your staff 3 – 4 - Security incidents happen every day. How do you identify the important incidents and ensure the business remains effective and up-and-running through them? 5 - It's essential that everyone understands that they are responsible and accountable. They need to know what part they play in the wider whole. 6 - Test your processes, procedures and people regularly.

Cyber Self-Defence Understand your threats and vulnerabilities Getting the basics right Anti-virus, Anti-Spam, Firewall/s Vulnerability & Penetration testing Security patching for everyone Password Security What is Encryption and Why it’s important? Incident Management and Contingency plans Look at your 3rd parties Suppliers Education, Education, Education ISO27001, PCI DSS or Cyber Essentials Cyber Insurance & how it helps

For more information (or a coffee!) Email: ghibberd@theagenci.com LinkedIn: https://uk.linkedin.com/in/garyhibberd Twitter: @AgenciGary Skype: Agenci_Gary Or call me on 0744 7911 742!

Thank you for listening. GARY HIBBERD Managing Director Thank you for listening. Thank you for listening.