SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Risk Less, Achieve More with Proactive Security
Ng Tuck Bin
Client Manager Solutions – Security, Dimension Data Malaysia
Risk Less, Achieve More with
Proactive Security
Five Cybersecurity Trends
IT teams will adopt the
mindset of ‘we don’t trust
anybody’
Deception technologies
become the security
enablers of IoT and OT
Robo-hunters are the new
norm
Zero Trust Network Deception Technology Robo HuntersBehavioural analytics Block Chain
Behavioural analytics and
artificial intelligence (AI)
demand a relook at identity
Businesses will start to
implement blockchain as a
cybersecurity measure in a
range of innovative ways
https://www2.dimensiondata.com/it-trends/cybersecurity-2018
Malware getting bigger and better
Source: Symantec, Internet security threat report; Verizon, 2017 Data Breaches Investigations Report, Dimension Data Insight & Analytics
Above mentioned attacks list is not exhaustive
*BEC - Business Email Compromise
Ransomware
caused Hollywood
Presbyterian
Medical Center to
declare an internal
emergency
Ransomware attacked 10
hospitals and 250
outpatient centers in the
MedStar network in the
Washington DC area, US
that compromised 2.2 mn
patient records
~11 mn documents
were leaked from
Panama based law
firm Mossack
Fonseca
About half the population
of Philippines became
victim of the data breach
at the Commission on
Elections
Microsoft patched
Five Internet Explore
(IE) zero day which
was being used in
targeted attacks in
South Korea
SWIFT hackers
stole $10 mn from
a bank in Ukraine
Leoni AG lost €40 mn in a
BEC scam
120,000 bitcoin stolen
from bitcoin exchange
Bitfinex, valued at
about $65 mn
Disk-wiping
malware
Shamoon
reappears after
four years
Takedown of
the Avalanche cybercrime
network including seizure
of 39 infrastructure
servers, with over 800 000
domains seized, sinkholed
or blocked
French hosting
company OVH
became target
of a 1Tb Gbps
DDoS attack
Hacking of a confidential database in
World Anti-Doping Agency by a
Russian cyber-espionage group
Feb’16 Mar’16 Apr’16 May’16 June’16 Aug’16 Sept’16 Oct’16 Nov’16 Dec’16 Feb17 May’17
A hacker named
Stackoverflowin hacked
over 150,000 printers
that has been left
accessible online and
start to send random
printing jobs
WannaCry ransomware,
termed as largest
ransomware attack, affected
75,000 window’s users
spread across 100 countries
and organizations including
Telefonica, FedEx, and UK
hospitals
GTIR
Global Threat
Intelligence
Report
Global Threat Intelligence Report 2017 Findings
www.dimensiondata.com/globalthreatreport
77% of ransomware
targets found in four industries
• Business / Professional Services (28%),
Government (19%), Healthcare (15%),
Retail (15%)
Victims by
sector
• 50% Incident
Response engagements
in Healthcare sector
related to ransomware
Vulnerability analysis
• effective patch management
remains a challenge
• nearly 47% of vulnerabilities
are more than three years old
Phishing, social engineering, ransomware the #1
threat to digital business
• phishing attacks responsible for 73% malware delivered
to organizations
• incident response engagements relating to malware up
from 19% to 41%
Ransomware the most common
malware discovered in client
environments
• 22% of Incident Response engagements due to
ransomware infection
Digital enterprise
NG Firewall Application
Control
Content
control Threat Analytics
Data
Control Blockchain
HQ / Data Centre
Operational
Technology
Branch Workspace IoT
Identity
ManagementGRC Analytics Deception DLP Forensics FW / IPS
Hybrid
Protection
Controls
Anti-DDoS
Consultant
Architect
Hunt Teams
Intelligence
MSS
Consultant
Architect
Hunt Teams
MSS
Intelligence
Challenges in securing the IT Infrastructure in a digital
enterprise
Policy Enforcement
How do you apply
consistent security control
across physical and virtual
environments?
Orchestration
Can you provision
security as fast as your
infrastructure?
Access control
How and who can access
the data centre.
End-point control
How do you stop
compromised end-points
from driving holes into your
data centre?
Visibility
What, where, when and by
whom?
Location
Do all workloads belong in
the data centre?
Regulation and
compliance
How do you maintain data
sovereignty SLA
responsibilities?
Dimension Data Approach
Keeping your business one step ahead of cybersecurity threats
Incident happen .. But how do will you deal with them?
Client
Management
Controls
Architecture
Strategy
Assessment
Security lifecycle… Assessment
• Active security gaps
identification
• Cloud readiness
assessment
Strategy
• Customised Security
Cybersecurity
Advisory (CA)
• Security policies and
procedures
development
Architecture
• Solution designed by
certified experts
Management
• Controls managed by
Managed Security
Services (MSS)
• Higher hardware uptime
• Technology lifecycle
management
• Complete IT outsourcing
Controls
• World-class
technology powered
by partners
• Certified engineers for
implementation &
deployment
Cybersecurity Advisory Approach…
Controls
validation
Architecture
review
Workshops /
interviews
• Security vision and strategy,
• Security framework,
• Risk management, Architecture
• Business requirements
• Architecture principals
• Security policy
• Vendor Rationalisation
• Penetration testing
• Threat and vulnerability scanning
• Firewall assurance and analysis
• Build and configuration reviews
Assess people, process and technology
Level 1 Level 2 Level 3
Actionable roadmap of security initiatives
SAA consulting framework provides:
An assessment of your actual security posture
An actionable roadmap in line with business objectives
includes level 1 includes levels 1 and 2
Regulation Framework
Cybersecurity Advisory creates customized roadmap…
Business view
Architect view
Designer view
Operations
Applications
Infrastructure
EndPoint
Technology
Architecture
Business
Architecture
AS-IS TO-BE
Grow maturity to improve
security posture
ManagedDefinedRepeatableInitialNon-Existent
Maturity
Scale:
Optimised
Identity management
Endpoint
Applications
Operations
Infrastructure
Asset / Config
Management
Incident
Management
Vulnerability / Patch
Management
Change
Management
Access
Management
Event Monitoring and
Management
WAF
SIEM
Security
Analytics
Data
Encryption
Email
Gateway
DB Activity
Monitoring
Host DLP
Document
Exchange
IDM SSO
Antivirus / HIPS
Patch
Management
Configuration
Management
Vulnerability
Management
MDM
DDOS
Protection
Firewall IPS
VPN
Network
Antivirus
Network DLP
EDR
Web
Gateway
CASB
Network
Sandboxing
Cyber
Deception
DNS
Wireless
Threat intelligence
Feeds Platform Analysis
Wired
Network
Access management
NACAAA MFA PAM
Cybersecurity Advisory Reference Model
Host security
Data protection and visibility
Rationalize your environment
Identify your maturity level
Align with Business
requirement
MSS delivery provides:
• Takes over the management and operation of security equipment
• Proactively identify and respond to threats
MSS Approach…
24x7 Monitoring &
Management
• 24x7 service
• Globally consistent
• Supports multi-vendor
Threat Identification
& Response
• Identify threats when it hits
• Provide security
recommendation to contain
Change
Management
• Certified experts makes
change, so you don’t
have to hire experts
Threat Intelligence
Continuously relevant and secured investment
Cloud-delivered | Consumption-based | Certified SOC delivery | Industry experts
CloudAppliances
forSecurity
Virtual Next-Generation Firewall (new and available)
ManagedServices
forSecurity
Managed NGFW
Managed Web-application
Firewall
Managed e-mail GatewayManaged Web Gateway
Managed Security Information
and Event Management (SIEM)
Managed Intrusion
Detection & Prevention
Firewall Intrusion Prevention System Antivirus Application Control URL Filtering
Anti-Bot Anti-Spam & Email Security Mobile Access IPSec VPN Data Loss Prevention
Introduction to SOC delivered Managed Security Services…
CloudServices
forSecurity
Web Application Firewall-as-a-
service
Web Security-as-a-serviceEmail Security-as-a-Service
Real-time Threat Management-
as-a-Service
to help you deliver predictive
cybersecurity
Yo u r
trusted partner
Solutions Use
Case
Ransomware Protection
Internet
OT
Network
Endpoint
Protection
+
DNS
Security
RTM
Web Security
Managed Services
RTM
Managed Services
RTM
Email Security
Enterprise
Network
NGFW
Managed Services
RTM
NGIPS
Managed Services
RTM
Network
Monitoring
Email with
links /
attachments
Infected
websites
Ransomware
C2 PLCs
Services provided by Dimension Data MSS
Technology provided by partners
Threat Intelligence
Security SME
Incident Response
Consulting
Dark web monitoring
Network
Deception
RTM
Server
Deception
RTM
Network
Segmentation
RTM
Infected
endpoint
RTM
Managed Services
SIEM
Video
Thank You
Ng Tuck Bin
Client Manager Solutions – Security, Dimension Data Malaysia
tuck-bin.ng@dimensiondata.com

Más contenido relacionado

La actualidad más candente

Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityTim Bass
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?NetEnrich, Inc.
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 
Threat Modeling - Writing Secure Code
Threat Modeling - Writing Secure CodeThreat Modeling - Writing Secure Code
Threat Modeling - Writing Secure CodeCaleb Jenkins
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 

La actualidad más candente (19)

Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Threat Modeling - Writing Secure Code
Threat Modeling - Writing Secure CodeThreat Modeling - Writing Secure Code
Threat Modeling - Writing Secure Code
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 

Similar a Achieve More Security with Proactive and Predictive Defenses

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
empowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfempowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfbasilmph
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfsphinx Worldbiz
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 

Similar a Achieve More Security with Proactive and Predictive Defenses (20)

ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
empowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfempowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdf
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdf
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 

Más de NetworkCollaborators

Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesNetworkCollaborators
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onNetworkCollaborators
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan kohNetworkCollaborators
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessNetworkCollaborators
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...NetworkCollaborators
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben greenNetworkCollaborators
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onNetworkCollaborators
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahNetworkCollaborators
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureNetworkCollaborators
 

Más de NetworkCollaborators (20)

Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quah
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Achieve More Security with Proactive and Predictive Defenses

  • 1. Risk Less, Achieve More with Proactive Security Ng Tuck Bin Client Manager Solutions – Security, Dimension Data Malaysia
  • 2. Risk Less, Achieve More with Proactive Security
  • 3. Five Cybersecurity Trends IT teams will adopt the mindset of ‘we don’t trust anybody’ Deception technologies become the security enablers of IoT and OT Robo-hunters are the new norm Zero Trust Network Deception Technology Robo HuntersBehavioural analytics Block Chain Behavioural analytics and artificial intelligence (AI) demand a relook at identity Businesses will start to implement blockchain as a cybersecurity measure in a range of innovative ways https://www2.dimensiondata.com/it-trends/cybersecurity-2018
  • 4. Malware getting bigger and better Source: Symantec, Internet security threat report; Verizon, 2017 Data Breaches Investigations Report, Dimension Data Insight & Analytics Above mentioned attacks list is not exhaustive *BEC - Business Email Compromise Ransomware caused Hollywood Presbyterian Medical Center to declare an internal emergency Ransomware attacked 10 hospitals and 250 outpatient centers in the MedStar network in the Washington DC area, US that compromised 2.2 mn patient records ~11 mn documents were leaked from Panama based law firm Mossack Fonseca About half the population of Philippines became victim of the data breach at the Commission on Elections Microsoft patched Five Internet Explore (IE) zero day which was being used in targeted attacks in South Korea SWIFT hackers stole $10 mn from a bank in Ukraine Leoni AG lost €40 mn in a BEC scam 120,000 bitcoin stolen from bitcoin exchange Bitfinex, valued at about $65 mn Disk-wiping malware Shamoon reappears after four years Takedown of the Avalanche cybercrime network including seizure of 39 infrastructure servers, with over 800 000 domains seized, sinkholed or blocked French hosting company OVH became target of a 1Tb Gbps DDoS attack Hacking of a confidential database in World Anti-Doping Agency by a Russian cyber-espionage group Feb’16 Mar’16 Apr’16 May’16 June’16 Aug’16 Sept’16 Oct’16 Nov’16 Dec’16 Feb17 May’17 A hacker named Stackoverflowin hacked over 150,000 printers that has been left accessible online and start to send random printing jobs WannaCry ransomware, termed as largest ransomware attack, affected 75,000 window’s users spread across 100 countries and organizations including Telefonica, FedEx, and UK hospitals
  • 6. Global Threat Intelligence Report 2017 Findings www.dimensiondata.com/globalthreatreport 77% of ransomware targets found in four industries • Business / Professional Services (28%), Government (19%), Healthcare (15%), Retail (15%) Victims by sector • 50% Incident Response engagements in Healthcare sector related to ransomware Vulnerability analysis • effective patch management remains a challenge • nearly 47% of vulnerabilities are more than three years old Phishing, social engineering, ransomware the #1 threat to digital business • phishing attacks responsible for 73% malware delivered to organizations • incident response engagements relating to malware up from 19% to 41% Ransomware the most common malware discovered in client environments • 22% of Incident Response engagements due to ransomware infection
  • 7. Digital enterprise NG Firewall Application Control Content control Threat Analytics Data Control Blockchain HQ / Data Centre Operational Technology Branch Workspace IoT Identity ManagementGRC Analytics Deception DLP Forensics FW / IPS Hybrid Protection Controls Anti-DDoS Consultant Architect Hunt Teams Intelligence MSS Consultant Architect Hunt Teams MSS Intelligence
  • 8. Challenges in securing the IT Infrastructure in a digital enterprise Policy Enforcement How do you apply consistent security control across physical and virtual environments? Orchestration Can you provision security as fast as your infrastructure? Access control How and who can access the data centre. End-point control How do you stop compromised end-points from driving holes into your data centre? Visibility What, where, when and by whom? Location Do all workloads belong in the data centre? Regulation and compliance How do you maintain data sovereignty SLA responsibilities?
  • 9. Dimension Data Approach Keeping your business one step ahead of cybersecurity threats
  • 10. Incident happen .. But how do will you deal with them?
  • 11. Client Management Controls Architecture Strategy Assessment Security lifecycle… Assessment • Active security gaps identification • Cloud readiness assessment Strategy • Customised Security Cybersecurity Advisory (CA) • Security policies and procedures development Architecture • Solution designed by certified experts Management • Controls managed by Managed Security Services (MSS) • Higher hardware uptime • Technology lifecycle management • Complete IT outsourcing Controls • World-class technology powered by partners • Certified engineers for implementation & deployment
  • 12. Cybersecurity Advisory Approach… Controls validation Architecture review Workshops / interviews • Security vision and strategy, • Security framework, • Risk management, Architecture • Business requirements • Architecture principals • Security policy • Vendor Rationalisation • Penetration testing • Threat and vulnerability scanning • Firewall assurance and analysis • Build and configuration reviews Assess people, process and technology Level 1 Level 2 Level 3 Actionable roadmap of security initiatives SAA consulting framework provides: An assessment of your actual security posture An actionable roadmap in line with business objectives includes level 1 includes levels 1 and 2 Regulation Framework
  • 13. Cybersecurity Advisory creates customized roadmap… Business view Architect view Designer view Operations Applications Infrastructure EndPoint Technology Architecture Business Architecture AS-IS TO-BE Grow maturity to improve security posture
  • 14. ManagedDefinedRepeatableInitialNon-Existent Maturity Scale: Optimised Identity management Endpoint Applications Operations Infrastructure Asset / Config Management Incident Management Vulnerability / Patch Management Change Management Access Management Event Monitoring and Management WAF SIEM Security Analytics Data Encryption Email Gateway DB Activity Monitoring Host DLP Document Exchange IDM SSO Antivirus / HIPS Patch Management Configuration Management Vulnerability Management MDM DDOS Protection Firewall IPS VPN Network Antivirus Network DLP EDR Web Gateway CASB Network Sandboxing Cyber Deception DNS Wireless Threat intelligence Feeds Platform Analysis Wired Network Access management NACAAA MFA PAM Cybersecurity Advisory Reference Model Host security Data protection and visibility Rationalize your environment Identify your maturity level Align with Business requirement
  • 15. MSS delivery provides: • Takes over the management and operation of security equipment • Proactively identify and respond to threats MSS Approach… 24x7 Monitoring & Management • 24x7 service • Globally consistent • Supports multi-vendor Threat Identification & Response • Identify threats when it hits • Provide security recommendation to contain Change Management • Certified experts makes change, so you don’t have to hire experts Threat Intelligence Continuously relevant and secured investment Cloud-delivered | Consumption-based | Certified SOC delivery | Industry experts
  • 16. CloudAppliances forSecurity Virtual Next-Generation Firewall (new and available) ManagedServices forSecurity Managed NGFW Managed Web-application Firewall Managed e-mail GatewayManaged Web Gateway Managed Security Information and Event Management (SIEM) Managed Intrusion Detection & Prevention Firewall Intrusion Prevention System Antivirus Application Control URL Filtering Anti-Bot Anti-Spam & Email Security Mobile Access IPSec VPN Data Loss Prevention Introduction to SOC delivered Managed Security Services… CloudServices forSecurity Web Application Firewall-as-a- service Web Security-as-a-serviceEmail Security-as-a-Service Real-time Threat Management- as-a-Service
  • 17. to help you deliver predictive cybersecurity Yo u r trusted partner Solutions Use Case
  • 18. Ransomware Protection Internet OT Network Endpoint Protection + DNS Security RTM Web Security Managed Services RTM Managed Services RTM Email Security Enterprise Network NGFW Managed Services RTM NGIPS Managed Services RTM Network Monitoring Email with links / attachments Infected websites Ransomware C2 PLCs Services provided by Dimension Data MSS Technology provided by partners Threat Intelligence Security SME Incident Response Consulting Dark web monitoring Network Deception RTM Server Deception RTM Network Segmentation RTM Infected endpoint RTM Managed Services SIEM
  • 19. Video
  • 20. Thank You Ng Tuck Bin Client Manager Solutions – Security, Dimension Data Malaysia tuck-bin.ng@dimensiondata.com