Cyber Security 04/04/2019 STEP Mauritius 2019

Slides:



Advertisements
Similar presentations
Account Assurance Services This is what we protect you from the consequences of Cyber Crime.
Advertisements

CYBER & Product Liability & Professional Indemnity
Travelers CyberRisk for Insurance Companies
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Unit 4 – Impact of the use of IT on Business Systems.
People Who Change the World Need the Tools to Do it! Holly Ross, Executive Director Security Matters It’s not about the network.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Information Systems Services How to Protect Yourself On-Line (Keeping Safe At Work) Kevin Darley, IT Security Co-ordinator 7 th March 2013.
Desktop Security: Making Sure Your Office Environment is Secure.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Describe the potential of IT to improve internal and external communications By Jim Green.
Financial Times Matheson is ranked in the FT’s top 10 European law firms Matheson has also been commended by the FT for corporate law,
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
Information Management System Ali Saeed Khan 29 th April, 2016.
Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. Cyber Security. Evolved. Building Resilience 29th May 2013.
Snowfensive At Snowfensive.com, we provide specialized cyber security risk assessments for organizations. We also give security awareness training for.
AP CSP: Cybercrime.
Risk or Reward Internal Threat External Threat.
Cyber in Financial Services
Clients and Prospective Clients on the Threat of Cyber Crime
Michael Wright • Chief Security Officer • Tech Lock
Cyber Security Zafar Sadik
Executive Director and Endowed Chair
Today’s cyber security landscape
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Insiders are Today’s Biggest Security Threat
Overview of Data Communications Security Concepts
Level 2 Diploma Unit 11 IT Security
Welcome to Milton’s Parts Express
Compliance with hardening standards
Chapter 34 risk management Section 34.1 Business Risk Management
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Lecture 14: Business Information Systems - ICT Security
Global Cyber Insurance Market By Manufacturers, Countries, Type And Application, Forecast To 2022 Publish Date : 04-Dec-2017 No of Pages : 116 Single User.
Business Risks of Insecure Networks
Answer the questions to reveal the blocks and guess the picture.
CHAPTER 4 Information Security.
Central Intelligence Agency Information Session
Cyber Security Lesson Quarter 1.
CSI Survey 2007 Tiffany Gorman
Data Security Team 1.
Avast is one of the leading antivirus providers globally and has gained an immense pace in securing loyal users. Avast have a massive user base across.
Cyber Security in Ports Business as Usual?
الباب الثاني الأنواع المختلفة للشركات
Internet Security Threat Status
Curating an Effective Security Culture
Global Issues Seminar Series
Cybercrime: protecting your firm
Cyber Security Culture
Security Use Case Description Public charter schools serving grades K-12. Operates 40 schools and serves over 16,000 students and over 2,000 teachers.
DATA LOSS PREVENTION Mr. Collins Oduor.
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Threatcasting Jon Brickey, Ph.D..
Strategic threat assessment
Information Security – Sep 18
Cyber Security in a Risk Management Framework
Information Protection
DATA BREACHES 6 4 , 9 3 There were…
Africa’s Triangle of Misery, Part 2 & Africa’s Economies
Texas Assisted Living Association 2019 Conference
Information Protection
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

Cyber Security 04/04/2019 STEP Mauritius 2019 Rivaj Parbhu – Associate Director Control Risks

2500 42 178 18 people work from offices with experience in countries across Introduction to company 18 sectors worldwide Our global reach

Cyber Security Security Risk

Probability Impact

5 Risk of rain in Mauritius today

350 000 Risk of being struck by lighting in Johannesburg, South Africa.

264 100 000 Risk of being killed by a shark in the waters off the USA.

312 Risk of experiencing a cyber breach in a year. *NBER Working Paper No. 24409 March 2018

Impact Probability Who? Why? Insiders Theft Criminals Extortion Ideologists Nation States Theft Extortion Competition Promotion

What? Information systems indispensable to the functioning of the other business systems Information systems essential to those business activities that create the most value for that business or for its customers Information systems with the potential to cause the greatest liabilities if they go wrong US Cyber Consequences Unit - 2012

How? Malware Phishing Zero Day Exploits Man in the middle Denial of Service SQL Injection

Internal Manage your passwords intelligently. Train your staff in a deliberate manner Anti-virus, malware and patching Identify what matters most and protect it Think and plan ahead – know who to call

External ?