Download presentation
Presentation is loading. Please wait.
Published byTabitha O’Neal’ Modified over 8 years ago
1
S ECURE E-S YSTEMS AS A COMPETITIVE ADVANTAGE IN A GLOBAL MARKETS By Cade Zvavanjanja Cybersecurity Strategist By Cade Zvavanjanja Cybersecurity Strategist
2
A GENDA 5 Common Mistakes Is Zimbabwe under threat What is cybersecurity Case for competitive advantage Way forward
4
Is Zimbabwe under threat??
5
Some Responses
6
H ACKERS I NFORMATION W ARRIORS ? Personal motives Retaliate or ”get even” Political or terrorism Make a joke Show off/Just Because Elite Hackers Black Hat Grey Hat White Hat No hat Malicious Code Writers Criminal Enterprises Trusted Insiders Economic gain Steal information Blackmail Financial fraud Inflicting damage Alter, damage or delete information Deny services Damage public image
7
How is info attacked
8
T ODAY ’ S T REND TerroristsWhite Collar Crime Open Source Disasters Theft Scripts ID Theft Insider/Espionage
9
Easy of attacks
15
Zimbabwe Landscape
16
Zimbabwe vs. Global Landscape
17
Process Organization Technology Opt/in/out Regulatory Requirement Security/Pr ivacy Policy Planning and Strategy Program Maturity Program Metrics Cybersecurity Architecture Privacy Strategy Data Classification Analysis Privacy Teams Policy Development Policy Update Plans Decision Management Privacy Support Architecture Awareness Privacy Strategy Data Classification Analysis Privacy Teams Policy Development Policy Update Plans Decision Management Privacy Support Architecture Awareness Privacy Risk Assessments Data Governance Vendor Governance Technology Planning Business Process Review Information Security Information Privacy Privacy Risk Assessments Data Governance Vendor Governance Technology Planning Business Process Review Information Security Information Privacy External Support Infrastructure Privacy Auditing Incident Response Crisis Management Knowledge Management Consumer Support Infrastructure Open Source Intelligence External Support Infrastructure Privacy Auditing Incident Response Crisis Management Knowledge Management Consumer Support Infrastructure Open Source Intelligence - # - 17 People Compliance
18
18 Ecommerce Site Data Storage Business Interfaces IT/IS/ Developmen t IT/IS/ Developmen t Anti-Virus Firewalls Encryption Security in SDLC Threat Modelling Build Standards Information Security Policies Legislative Compliance Configuration Reviews Patch Management Access Control Reviews Application Testing Penetration Testing Intrusion Detection Vulnerability Assessment Vetting / References Disciplinary Procedure Awareness & Training Holistic IT security
19
-Technology containment - Process containment - Procedure containment - Engage digital forensics process - Collect evidence - Engage 3 rd party - Detect Incident - Identify source of identified -Log incident - Reduce false positive H IGH L EVEL O VERVIEW Detection Assessment AnalysisContainment Digital Forensics Resolution & Reporting - Determine scope - Assemble Response Team - Collect & sort facts - Determine scope - Assemble Response Team - Collect & sort facts - Notify client - Notify regulators - Remediate - Analyze long term effects - Analyze lessons learned Privacy Incident Response Process
20
Thank You Tel: +236 733 782 490 +263 773 796 365 +263 -4- 733 117 cadezvavanjanja@gmail.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.