march 2019
play

March 2019 An A2Z Tech Presentation page 1 Digital Transformation - PowerPoint PPT Presentation

Successful Digital Transformation whilst Protecting Against Cyber Fraud March 2019 An A2Z Tech Presentation page 1 Digital Transformation an example An A2Z Tech Presentation page 1 The Key Challenges An A2Z Tech Presentation page 2 The


  1. Successful Digital Transformation whilst Protecting Against Cyber Fraud March 2019 An A2Z Tech Presentation page 1

  2. Digital Transformation an example An A2Z Tech Presentation page 1

  3. The Key Challenges An A2Z Tech Presentation page 2

  4. The Resulting Cyber Security Challenges • Evolving traditional security to focus on data, people and risks Aligning and making security integral to the digital journey • Protection is no longer enough • Prevention • • Education • Anticipation Fallout – post breach • Evolution of approach to cyber • Most breaches will have targeted individuals • • Securing the perimiter is not enough anymore An A2Z Tech Presentation page 3

  5. The Resulting Cyber Security Challenges Good practices Regular assessments, diagnostics and audits • Cyber security Essentials & Plus • Strategy must focus on data, risks and People • An A2Z Tech Presentation page 4

  6. Recent examples Stuxnet – industrial system attack • Attacking critical infrastructure • Telecom company – theft of personal info • • Fined £400,000 Reputation damage • Ransomware • NHS crippled by ransomware • Globally 200,000 computers across 150 countries • Questions to ask • Where is data held • Cyber crime is probably the biggest risk to organisations • Annual costs anything between £300 to £400 billion • • ICO – GDPR Are Processes documented • 72 hour rule • An A2Z Tech Presentation page 5

  7. Final thoughts Organisations maturity in terms of cyber and digital transformation • Ask questions • Has org considered tech, people, processes and regulation • Data, Privacy and protection • Big data shouldn’t mean bigger problems • Approach to Security • • Balance between security and functionality Security at relevant places • Are processes in place to deal with breaches and incidents • Culture and awareness • • Education of staff Testing of security • Well documented systems and digital assets • An A2Z Tech Presentation page 6

Recommend


More recommend