Download presentation
Presentation is loading. Please wait.
Published byLouisa Taylor Modified over 8 years ago
1
From Technology to Intelligence from
2
The Current Cyber Discussion Business leaders are more aware of Cyber Risk but ….. ‒ struggle to connect Cyber issues to business impact Vendors are responding with technology and intelligence data – are we keeping up? Cyber security services discussions remain largely in the technical domain
3
Cyber Security Gap Vendor Capability growth rates Cyber Venture Funding Deals In 2014 (CBInsights, 2015) Worldwide Intelligence Services Market in 2015 (IDC,2014) PWC, GSISS 2015 Incident Growth Rates
4
Cyber Defense Capability Challenges Heavy demand driving up labor costs and churn Limited pipeline of new talent VC Funding driving new solution offers Rapid evolution of strategies Process agility is the key to operationalizing your capabilities CYBER DEFENSE PEOPLETOOLS PROCESS
5
“If you know your enemies and know yourself, you will not be imperiled in a hundred battles.” Sun Tzu The Art of War
6
Mission Priorities – Know the Battlefield Regulatory Environment Market Conditions Organizational Priorities Go to Market Approach Information Management Strategy l Sarbanes-Oxley l HIPAA / HiTECH l SEC Reporting l Operational Goals l Organizational Structure l Cyber Risk Ownership l Enterprise Architecture l Security Architecture l Business Applications
7
Cyber Services Strategy – Know Yourself Active defense and continuous hardening processes demand context which… …reduces the friction between Cyber Security and IT. CYBER CONTEXT IT
8
Optimizing Cyber Operations Integrate an intelligence cycle into operations delivers mission and business focus and increased effectiveness Partner with Innovative companies re-thinking the cyber challenge Knowledge is critical to winning the battle
9
9
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.