Download presentation
Presentation is loading. Please wait.
Published byMervyn Singleton Modified over 9 years ago
1
Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security
2
Outline Background Defence in Depth Securing a network Risk vs Reward Predictive Intelligence Education and awareness
3
Ontario Government 60,000 plus OPS employees 2,300 locations 27 ministries IT Corporate CIO, CTO, CPO 8 CIOs
4
Ontario GO-Net 94,000 emails accounts Thousands of devices connected to the network Cyber Security Branch 24/7 Ops Centre, forensics, IAM, risk management, security design, compliance, penetration testing, education & awareness, engagement
5
Defence In Depth Cyber Security Architecture TRAs Policies & Directives Industry Standards Security Appliances Anti- Virus Penetration Tests Operations Centre CompliancePatch Mgmt User Education Collaboration
6
How Cyber Security Is Viewed
7
How Cyber Security Should Be Viewed Business Enabler Partner
8
Translate to the C-Suite Need to stop being technical Simplify things And…
9
Layers of Security Securing a House Architectural Standards Safety Practices Access Control Deterrent Emergency Response
10
Layers of Security Securing a Network Architectural Standards Safety Practices Access Control Deterrent Emergency Response IDS IPS
11
Risk Vs Reward Cyber security is a business risk and must be treated just like any other business risk Risk must be managed and balanced against potential rewards C, I, A Example 1 Example 2
12
Value of OPS Information Holdings Information TypeWho Cabinet confidence informationOrganized crime Budget InformationNation states Tax and health recordsHactivists Police and Justice informationOrganized crime Natural Resources (Ring of Fire)Others wanting to gain economic advantage Intellectual propertyOthers wanting to gain economic advantage
13
Predictive Intelligence Using intelligence to predict where you will attacked next Understand the threat Threat = Capability + Intent What is happening in your environment Example 1
14
Intelligence Sources Log files Collaboration Subscription and vendor services Others?
16
Education and Awareness Double edged sword End user Frequency Message Medium
17
Messaging Offer to brief business units Cyber Security Awareness Month
18
Weekly Themes Week 1Week 2Week 3Week 4Week 5 What is Cyber Security Cyber Security Threats Protections and Safeguards Working Together to Keep us Safe Safety Online at Home
19
Parting Thought The CISO is a catalyst for change. We can enable business to meet their objectives while maintaining security We are their partners
20
Questions/Discussion
21
CISOs know that to be truly secure, they must adopt a defence in depth approach to cyber security. But is this enough? This presentation will describe the components of defence in depth and then discuss what steps the CISO should consider to take their organization’s cyber security to the next level. This includes partnering with business units on risk management, predictive intelligence and an aggressive cyber security awareness program. 16/05/2015
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.