2015 - data security solutions @dienas bizness exigen ibm - business data protection

21
Security Intelligence for business data protection Andris Soroka 2015, Riga Riga, Latvia

Upload: andris-soroka

Post on 16-Jul-2015

308 views

Category:

Business


2 download

TRANSCRIPT

Page 1: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Security Intelligence

for business data

protection

Andris Soroka2015, Riga

Riga, Latvia

Page 2: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

“Data Security Solutions” business cardWhat We Do?

DSS

ICT Security Provider

Advisory, Consulting, Installation,

Support

Most Innovative Portfolio in

BalticsMember–

ships, Awareness

Rising

Technology &

Knowledge Transfer

ICT Security

Evangelists

Endpoints

Applications

Networks

Data

Identity

Mobility

Management

Cloud

Page 3: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

DSS Global Partnerships

Page 4: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

DSS Delivering Excellent ICT Security Operatitions to its Customers

Customer ICT Security

Operations Excellence

Cooperation with Industry Top Technology

Leaders Recognised by Gartner, IDC,

Forester

Top level ICT Security

Professionals

Selected Cutting Edge ICT Security Innovative

TechnologyIntegration

Pan-Baltic

Projects

Particular Focus on Security

Page 5: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Our international cyber security conference

In 2015 included in World Summit of Information Society Prize candidates.

Online voting is ON.

C5 – building theConfidence in Security in the use of ICT.

Page 6: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Political (external and internal)

Technological (risks, threats, fraud, attacks, leaks)

Economical (budget reality, competition, costs…)

Legal (compliances, regulations etc.)

Professional (HR, information quantity)

Psychological ( traditions / knowledge / trust)

Challenges of C-level executives

Page 7: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection
Page 8: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Trends of the digital future

Page 9: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Cyber security future is now ..

Page 10: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection
Page 11: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection
Page 12: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

LogManageme

nt

Security Intelligence

Network Activity

Monitoring

RiskManageme

nt

Vulnerability

Management

Network Forensics

Page 13: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Suspected

Incidents

Prioritized Incidents

Servers and mainframes

Data activity

Network and virtual activity

Application activity

Configuration information

Security devices

Users and identities

Vulnerabilities and threats

Global threat intelligence

Extensive Data Sources

AutomatedOffenseIdentification

•Massive data reduction

•Automated data collection,

asset discovery and profiling

•Automated, real-time,

and integrated analytics

•Activity baselining

and anomaly detection

•Out-of-the box rules

and templatesEmbedded

Intelligence

Security intelligence for automated offense detection

Page 14: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Prevent. Detect. Respond.

Page 15: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection
Page 16: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Business part

Business processes analysis from tech perspective

Assessment and management of cyber security risks

Related technological part

Inventory of devices and software

Secure configuration of everything (end-users, devices)

Vulnerability assessment and management

Malware defenses, application security, pen tests

Wifi security

Mobile security

Data security

Continuos skills training and learning

Access control and visibility

Audit, monitoring, analysis, incident response and more

Business & technology must come together

Page 17: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection
Page 18: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

How we can help

Analyze and detect risks

Fulfill audit

Build security action plan

Train the employees

Pass compliance regulations

Save from data leakage

Protect critical assets

Get rid of passwords

Consult Your professionals

Protect from attacks

Help creating RFP docs

Be Your IT Security Advisor!

Business value of «Data Security Solutions»

Page 19: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Balancing costs and risk – floods happen..

Page 20: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Contact UsAndris [email protected]

Mob. +371 29162784

Riga, Latviawww.dss.lvLinkedIn: http://lv.linkedin.com/in/andsor

Twitter: @andris_soroka / @dss_it_security

Facebook: http://www.facebook.com/lvdss

Youtube: http://ow.ly/FAfEN

SlideShare: http://www.slideshare.net/andsor

Page 21: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection

Think Security FirstThank you