Your Company’s cyber security assessment Hands-on session using CyberWISER Light [Anže Žitnik, XLAB, WISER Team] #CyberSecPractice.

Slides:



Advertisements
Similar presentations
CGW 08, Kraków, October 13-15th,  Integration of instrumentation and selected applications with e-Infrastructure and maintenance on production.
Advertisements

Cyber Security & Critical Controls Chris Few Industry Enabling Services CESG February 2011 © Crown Copyright. All rights reserved.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
1 Estimating the Cost and Benefits of Software Assurance Investments Thomas P. Frazier November 9, 2006.
Risk Management Strategies in an Uncertain World April 12-13, 2002 Objectives of Roundtable Agenda for Roundtable.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center.
US Army Corps of Engineers BUILDING STRONG ® Texoma and Missouri Region JETS Training Symposium Resiliency Planning Through Hazard Vulnerability Analysis.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
New A.M. Best Cyber Questionnaire
FFIEC Cyber Security Assessment Tool
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
MTRS3 Solutions and Services (SME, IL). MTRS in a nutshell  A security consulting company specialising in high risk environments (SME)  Main fields.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Enterprise Risk Management & IT Implications BADM 559 Megan Kasbohm.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Managed IT Services in Charlotte NC. We are leading managed IT services providers in Charlotte NC. Call us now on (704) for managed IT services.
Calgary Computer Security Solutions
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
New A.M. Best Cyber Questionnaire
Developing Software Security Industry Tools
Design for Security Pepper.
Sessione interattiva: Autovalutazione della cyber security della tua Azienda [WISER Team] #CyberSecPractice.
Cyber Resilient Energy Delivery Consortium
COMP3357 Managing Cyber Risk
Introduction to a Security Intelligence Maturity Model
California Cybersecurity Integration Center (Cal-CSIC)
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Overview of WISER and the Democratisation of Cyber security Michele Nannipieri, Director – Trust-IT Services #CyberSecPractice.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Security Engineering.
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
NYBA 2017 Technology, Compliance &
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
CMGT 431 Education for Service/tutorialrank.com
CMGT 431 STUDY Education for Service- -cmgt431study.com.
Security Essentials for Small Businesses
An Urgent National Imperative
Cybersecurity compliance for attorneys
CRITICAL INFRASTRUCTURE CYBERSECURITY
Trust and Security Unit
Cyber Risk & Cyber Insurance - Overview
Cyber security policy in an evolving landscape
GDPR for SMEs webinar 15 June 2018.
Powerful Partnerships with Industry Leaders
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Community of Users.
Third-party risk management (TPRM)
Cyber Security Accelerator for trusted SMEs IT Ecosystems
MAZARS’ CONSULTING PRACTICE
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
Presentation transcript:

Your Company’s cyber security assessment Hands-on session using CyberWISER Light [Anže Žitnik, XLAB, WISER Team] #CyberSecPractice

About XLAB Software development and research company An SME founded in 2001 The biggest private research organization in Slovenia Doing research to develop products and create start-ups Employing 65+ experts in computer science, mathematics, engineering 15 products over 8 start-ups Bridging the gap between academia and industry 19 FP7 projects, 12 H2020 projects Coordinating 1 H2020 project Cybersecurity in practice – Cluj, 17 October 2017 – www.cyberwiser.eu - @cyberwiser

Cybersecurity in practice – Cluj, 17 October 2017 – www. cyberwiser Cybersecurity in practice – Cluj, 17 October 2017 – www.cyberwiser.eu - @cyberwiser

WISER Cyber Risk Monitoring Services Cyber security should be a fundamental part of any business.  WISER offers a suite of services tailored to specific needs Cybersecurity in practice – Cluj, 17 October 2017 – www.cyberwiser.eu - @cyberwiser

CyberWISER Service Portfolio CyberWISER-Light – self-assessment of cyber risks and vulnerabilities in IT system. User-friendly service - suited to every type of organisation. Especially good for time- and resource-constrained SMEs. CyberWISER-Essential – Risk Platform as a Service (RPaaS) for self-assessment of exposure levels with continuous, quasi-real-time monitoring Standardised mitigation plan No need for outside help CyberWISER-Plus – RPaaS + Customised approach to cyber risk assessment Face-to-face support in self-assessment phase Deployment support & mitigation plan tailored to your organisation Cybersecurity in practice – Cluj, 17 October 2017 – www.cyberwiser.eu - @cyberwiser

Cyber WISER Light: free online service Part 1 – Risk Profiling Questionnaire No need to be an IT expert or risk manager. Complete the questionnaire and download your personalised report. Start defining your cyber strategy. Part 2 – Vulnerability Test Helps prevent attacks before they damage your business. You have control from start to finish. Download your personalised report ranking your specific vulnerabilities. Your risks will evolve with the threat landscape so use this free online service regularly, to ensure fresh data for maximum protection Cybersecurity in practice – Cluj, 17 October 2017 – www.cyberwiser.eu - @cyberwiser