Download presentation
Presentation is loading. Please wait.
Published byΠαρθενιά Μαγγίνας Modified over 6 years ago
1
How are we keeping our company & clients safe?
3
Energy | Water | Transport
Efficiencies Evidence
4
An Integrated World – Data Security Challenges
5
Defence in Depth
6
Defence in Depth People Technology Operations
Principle of least privilege Security culture, e.g. Password safes Training and Support Technology Use of Firewalls, Proxys, DMZs, VPNs, IP restrictions, Virus scanners Storage encryption by default Sandbox any vulnerable / obsolete technologies Centralised security utilising SAML / JWT tokens with federated single sign on Operations Physical security, Locked doors! Appropriate sessions timeouts Password complexity rules Control of data transfer – Discourage poor use of
7
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.