Download presentation
Presentation is loading. Please wait.
1
Data Security Team 1
2
Ashley Madison Canadian dating agency Actively encouraged affairs
All customer data compromised in 2015
3
Organizational Importance
Why Security Matters Organizational Importance Professional Impact
4
An SQL injection attack works by exploiting any one of the known SQL vulnerabilities that allow the SQL server to run malicious code. For example, if a SQL server is vulnerable to an injection attack, it may be possible for an attacker to go to a website's search box and type in code that would force the site's SQL server to dump all of its stored usernames and passwords for the site. Examples of Exploits
5
Value Bolsters Workforce Productivity Reduces Costs
Establishes Partnerships Reduces Costs Security & Compliance If there is one thing I learned this summer, is that tricking or compromising end-users is easy. It’s not that they are dumb, but that they are already oversaturated with tasks that when someone sends them an asking them to click on a link to enable two-factor authentication, and later input their user credentials for verification they do it almost instinctively. Which makes the importance and the value of information & data security that much more important. •Productivity – cyber security events interrupt day-to-day operations, and in 2016 cost the global economy $450B. Employees that are properly trained and know there is a layer of defense behind them if they were to become victims of an attack are not only more efficient, but effective employees. •Costs – While intuitively it doesn’t make sense, a focus on security can actually help reduce costs. Federal regulations such as HIPPA and PCI can be costly when considering implementation of security protocols, but are considerably even more expensive when you consider fines from legislators, class action lawsuits, insurance premiums, outside third party consultants and incident response teams, and a lack of public trust. Implementing adequate security protocols can help prevent the aforementioned costs while simultaneously making operations more efficient. •Partnerships – Companies that place a high intrinsic value on security will attract other companies looking to do the same. If you’re in the service industry and you’re known to protect client data at all costs, clients will want to do business with you because they can trust you. The events of the past two weeks with Equifax has proven that relationships between consumer and organizations can be built or damaged by a lack of security.
6
Problems/Limitations
High Initial Investment 1 Decrease in Agility 2 Constantly Changing 3
7
Solutions Scalable Security Suitable Vendor
8
Security as a Service Here are vendors of security solutions
Each company needs to look at a vendor and determine what will fit their security needs, here are some vendors companies could consider Bigger companies may want to look at something like IBM security, while smaller companies may want to look at Fire Eye
9
Target Cyber Attack (2013) Caused by malware
41,000,000 customers compromised $18.5 million Settlement for Data Breach Target
10
Future of Security IBM Watson Cyber Security
IBM QRadar & Watson uncover hidden threats Empowering security analysts Unstructured data correlated to local security offenses Intelligence, speed & accuracy
11
Recap & Final Thoughts Trust, cost & work productivity
Be invested in protecting company information Security threats have the potential to impact anyone Recap on points made in the beginning about why security matters (trust, intellectual property, cost) of cyber security involves AI Whether people are interested in security or not, it is something that will impact them in one way or another—either as someone working with cyber security or as a customer of someone who is impacted by a cyber attack –important to be invested in the protection of information Educating employees about importance and how to protect company data As a student, potential employee, business analyst, customer, etc. How does being more aware of this topic impact them?
12
Works cited https://en.oxforddictionaries.com/definition/cybersecurity
security--value-creation--and-the-balanced-scorecard.html worse 400k-fine-over-cyber-attack
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.