Strong Security for Your Weak Link:

Slides:



Advertisements
Similar presentations
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Advertisements

Director of Research, SANS Institute
BUSINESS B1 Information Security.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Akamai Technologies - Overview RSA ® Conference 2013.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
Enterprise Mobility Suite Technical and Business Briefing
Internal Security Threats
Cybersecurity - What’s Next? June 2017
Comprehensive Security and Compliance at an Affordable Price.
Cisco 2017 Security Annual Report
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Cloud Security IS Application-Centric Security
Security Training and Certification A look at why security should become a part of your DNA
Hybrid Management and Security
Journey to Microsoft Secure Cloud
Vidcoding Introduces Scalable Video and TV Encoding in the Cloud at an Affordable Price by Utilizing the Processing Power of Azure Batch MICROSOFT AZURE.
Firefish Software for Professional Recruiters Stays Available Around the Clock from Any Device and Anywhere by Using the Microsoft Azure Platform Partner.
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
Security managed from the cloud.
Measure Effectiveness of Communication, Engage Your Employees, and Bridge Communication Gaps with Sparrow App and Power of Microsoft Azure MICROSOFT AZURE.
Stylelabs Develops the Marketing Content Hub to Offer Enterprises a High-End Marketing Content Management Platform Based on Microsoft Azure MICROSOFT AZURE.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
Office 365 with confidence: security features for Office 365
Jon Peppler, Menlo Security Channels
Cybersecurity Awareness
2018 Real Cisco Dumps IT-Dumps
BRK3277 Making the best of the cloud: How Exchange Online is different from Exchange on-premises Tony
Company Overview & Strategy
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
Intelledox Infiniti Helps Organizations Digitally Transform Paper and Manual Business Processes into Intuitive, Guided User Experiences on Azure MICROSOFT.
MISSION STRATEGIC DIRECTION
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Home Internet Vulnerabilities
Revolutionized, Automated Cash and Gratuity Management for the Hospitality Industry, Thanks to Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: Evention.
CloudLabs, Powered by Azure, Enables the Quick, Easy, Cost-Effective Management, Distribution of Online Training Labs for Education and Business MICROSOFT.
Navigating Security Seas in a Small Ship with a Limited Crew
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Real World Advanced Threat Protection
Securing the Threats of Tomorrow, Today.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Secure once, run anywhere Simplify your security with Sophos
Chris Ince ISO Lead Auditor Security Risk Management Ltd
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Last.Backend is a Continuous Delivery Platform for Developers and Dev Teams, Allowing Them to Manage and Deploy Applications Easier and Faster MICROSOFT.
Protect Your Ecommerce Site From Hacking and Fraud
Information Protection
Microsoft Data Insights Summit
Introduction to Symantec Security Service
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Microsoft Data Insights Summit
Threat Landscape Update
Plan and design the solution
Information Protection
Cybersecurity Simplified: Phishing
Presentation transcript:

Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Today’s security tools are failing. .03% Dridex .02% Dyre ? Targeted Current security tools are ineffective at stopping even commodity threats, let alone targeted attacks.

Advanced threats target the way people work. 100% of targeted attacks affect people <10% start from web, social and other sources >90% of targeted attacks start with email Source: Verizon DBIR.

People are creating more data to protect. Average user creates 2TB of data/year Humans create up to 80% of an organization’s total data Typical attack surface up 44X Source: IDC.

The way people work is changing. Cloud Endpoints Networks

Is the way you work being used against you? Mobile Social Media Email Web Authentication Employee Identity Customer Service and Support Brand Engagement Applications Personal and Corporate Data

What is your social media security risk? Spam Fraudulent Accounts Malware “Troll” Content Account Takeover

Are your mobile apps leaking data? “75% of all mobile security breaches will be through apps” (Gartner IT Infrastructure & Operations Management Summit 2014)

Key Findings of The Human Factor 2015 On average, users click 1-in-25 malicious links in phish 66% of clicks occur within 24 hours after the message is received Peak delivery times are during business hours 1-in-5 clicks on malicious links occur off the network Attackers adapt faster than users can be educated

Can you tell when you’re being attacked?

Stopping Advanced Threats INSIGHT ACTION See Everything Correlate Everything Protect Everywhere Be in the flow of the attack channels to provide comprehensive protection. Know bad actors and tools across the attack chain, updating the defenses continuously. Stop attacks everywhere people use the target channel, on network or off, on any device.

The Right Approach: Stop advanced threats before they get to people Protect the information people create to reduce the attack surface and compliance risk Enable your people to respond quickly when things go wrong

proofpoint Next-generation cybersecurity to protect the way people work today