MISSION STRATEGIC DIRECTION

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
[Name / Title] [Date] Effective Threat Protection Strategies.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Akamai Technologies - Overview RSA ® Conference 2013.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Thomas E. Noonan President and Chief Executive Officer Issues in eBusiness Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Palo Alto Networks - Next Generation Security Platform
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Simple Threat Management For IT Teams and MSPs
Ilija Jovičić Sophos Consultant.
Six Steps to Secure Access for Privileged Insiders and Vendors
Cybersecurity - What’s Next? June 2017
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Cisco 2017 Security Annual Report
Network Security Fundamentals
A lustrum of malware network communication: Evolution & insights
MGT301 Principles of Marketing
Journey to Microsoft Secure Cloud
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Cyber Security: State of the Nation
Six Steps to Secure Access for Privileged Insiders and Vendors
Security managed from the cloud.
Carlos Marquez CEO, Connexa Network AG
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Office 365 with confidence: security features for Office 365
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Prevent Costly Data Leaks from Microsoft Office 365
Company Overview & Strategy
SAM Financial Services Cybersecurity Assessment
SAM GDPR Assessment <Insert partner logo here>
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Secure Browsing Because malware usually doesn’t identify itself.
Security Agility: Creating a Multi-Disciplinary Framework

Strong Security for Your Weak Link:
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Replace with Application Image
Security Essentials for Small Businesses
The Next Generation Cyber Security in the 4th Industrial Revolution
Panda Adaptive Defense Platform and Services
Case Study 1: Security Considerations
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Strategic threat assessment
Information Protection
Microsoft Data Insights Summit
The Changing Face of Data Security in the U.S. Federal Government
Threat Landscape Update
Machine Learning: - A cybersecurity FRIEND to beat the bad guys -
Information Protection
Presentation transcript:

MISSION STRATEGIC DIRECTION Founded in 2005; first customer shipment in 2007 More than 37,500 customers in 150+ countries FY16 $1.4B revenue 49% YoY growth that significantly outpaced the industry Over 85 of the Fortune 100 and 60% of the Global 2000 rely on us Excellent global support, awarded by J.D. Power and TSIA Experienced team of more than 4,100 employees MISSION To protect our way of life in the digital age by preventing successful cyberattacks. STRATEGIC DIRECTION To be the leading independent security company by building the world’s most innovative and effective security platform. Further questions 07588 473474

Further questions 07588 473474

AUTR REPORT KEY FINDINGS¹ - ARE YOU KEEPING PACE? Remote access application usage is rampant with 78 different apps in use globally SaaS-based application usage has grown 46% growth in usage, over 300+ SaaS apps, watch out for Shadow IT Public Cloud is the new DC option of choice with 100’s of apps choices, new vocabulary and bespoke eco system vendors Executable files are extremely toxic with nearly half found to be malicious. Email attachments continue to be a primary attack vector with high % of attachments malicious. ¹http://connect.paloaltonetworks.com/autr-report https://www.paloaltonetworks.com/resources/webcasts/threat-trends Further questions 07588 473474

PONEMON KEY FINDINGS² - ARE YOU KEEPING PACE? Time to deter the majority of attacks is 40Hrs 60% of all attackers move on to another target after this time Typical Vs Excellent Security 70Hrs to 147Hrs means attackers are more likely to “change target” Increased usage of low-cost and effective toolkits 63% Reporting increased use, 64% saying they are highly effective Cost and time to plan and execute attacks is decreasing Hacking tools have improved, 53% of respondents Attackers are opportunistic Adversaries go after the easiest targets first, 72% of respondents ²http://researchcenter.paloaltonetworks.com/2016/02/for-cyberattackers-time-is-the-enemy Further questions 07588 473474

HOW AM I DOING? ARE YOU KEEPING PACE? Where are my weaknesses and what should I do to improve my defences and close any gaps? How do I measure success? Relative to my industry, are my users the main source of Information Security Risk? Am I already compromised, if so, how bad is it? What’s the frequency? What am I being attacked with? How sophisticated is it? I am being attacked more than my peers? Further questions 07588 473474

HOW AM I DOING? ARE YOU KEEPING PACE? Where are my weaknesses and what should I do to improve my defences and close any gaps? How do I measure success?

HOW AM I DOING? ARE YOU KEEPING PACE? Where are my weaknesses and what should I do to improve my defences? How do I measure success?

HOW AM I DOING? ARE YOU KEEPING PACE? Relative to my industry, are my users the main source of Information Security Risk?

HOW AM I DOING? ARE YOU KEEPING PACE? Am I already compromised, if so, how bad is it? What’s the frequency? Validate this against existing URL controls and settings. Use this to help measure quality of existing tools. Review process for closing new C&C (embedded in new Malware) Use Behavioural Analysis to fingerprint the environment to detect insider threats. Further questions 07588 473474

HOW AM I DOING? ARE YOU KEEPING PACE? What am I being attacked with? How sophisticated is it? I am being attacked more than my peers? Further questions 07588 473474

HOW AM I DOING? Threat Name Infected User Type of Compromise No of Events Further questions 07588 473474

WHAT NEXT? WE JUST NEED TIME Andrew.Belcher@cwlsystems.co.uk / 07703 221676 Engage Palo Alto Networks (me) Arrange Meeting / Telephone Conference Review the type of engagement you feel you need Complete Prevention Posture Assessment Traps Endpoint Prevention Assessment Security Lifecycle Review Per Network Segment (Internet Edge / DC) Per Public Cloud Environment Per SaaS Application Prices start at ZERO $ (LOAN DEVICE) Training Prices start at ZERO $ (Test Drive) Further questions 07588 473474