acfcs csc webinar final 3-21-14

Post on 22-Jan-2015

238 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Navigating the Cybersecurity Minefield

Confronting the risks of data breaches, organized cybercrime, virtual currencies and more

Presented byTom Patterson

Sam Visner

ACFCS Webinar March 21, 2014

Certification, Training, Networking, News, Guidance

The Mark of Financial Crime Knowledge and Skill

Director, Cybersecurity ConsultingCSC

San Francisco

Tom Patterson

VP and General Manager, Global CybersecurityCSC

Washington, DC

Sam Visner

CYBERSECURITY CLIENTS AROUND THE GLOBE250+

GLOBAL ALLIANCE PARTNERS PROVIDING SECURITY EXPERTISE

15+

INTEGRATED GLOBAL SECURITY OPERATIONS CENTERS5+

YEARS PROVIDING CYBERSECURITY SERVICES35+

GLOBAL CYBERSECURITY PROFESSIONALS1900+

Who We Are

STRATEGIC

TECHNICAL

IDENTITY

ATD

GRC

APPS

SIEM

CONSULT

MANAGE

EMERGENCY

RETAINED

RESPOND

Cybersecurity

Portfolio

Trusted PartnerTargeted DefenseOperational EfficiencyComplete PortfolioGlobal FootprintIndustry Expertise

IT ModelChanged

TighterRegulations

Everything’sConnected

EscalatingThreats

Security MUST Evolve

Credit: Symantec

The Current Face of Advanced Persistent Threats (APT)

ReconInfiltrate

MapEscalate

CustomizeHumanMorphic

CollectExfiltrate/Attack

Hide

APT Stages

Credit: Symantec

The Cyber Impact of Crypto Currencies

ForeignIntelligence

ServicesOrganized

Crime

Non-StateActivists

GlobalTerrorists

WHO? External Threats

GANGS

Thieves

So, What’s an Executive to Do?

Triple S + R TSeparation (Risk | Compliance)

Supply Chain (Your Problem Now)Segmentation (Assume They are Inside)

Response (Planning + People)Technology (Your Ever Evolving Friend)

Cybersecurity Trends to Monitor CIP in the Financial Sector

--EO 13636

MSSPs for 'normal' events, tiger teams for incident response

Mobile device Payments

TOR Exchanges selling your stuff (LSO)

Supply Chain Security

Hottest Trends in Security Become PRO-Active

Situational AwarenessStrategic Planning

Automate for Speed & Efficiency Best TechnologyCentrally Managed

Eco-System SecurityBrands at Risk no matter Who’s at FaultIncludes All Partners

Recover GracefullyPlan Response AheadCustomize Each Event

Questions?

CONTACT:Sam VisnerSVisner@CSC.com

Tom Patterson ( @TomTalks )TPatterson6@CSC.com

CSC.com/Cybersecurity

top related