Post on 26-Dec-2015
© LogicaCMG 2006. All rights reserved
Enabling Personal Internet Security
Dave Martin
Managing Security Consultant
2Privacy in Cyberspace
Agenda
30 SecondIntroduction
Current and Emerging Cyberspace Threats
Addressing the Threats – Three Pronged Approach
3Privacy in Cyberspace
30 Second Introduction
• LogicaCMG
– Worldwide business support company
– 40,000 employees worldwide
– 250+ full time security consultants
– Full boardroom to bytes security service
4Privacy in Cyberspace
Current and Emerging Cyberspace Threats
• Consumers are exposed to fraud potential
• Viruses, Worms, Trojans, Letter Bombs and more…
• Unacceptable behaviour on-line
• Phishing already a significant problems for consumers
• Penetration of wireless networks
• E-mail interception
• Spear-phishing
5Privacy in Cyberspace
Education
Government websitesISP campaignsVendor adviceIndustry advice
Tools
Anti-virus & Anti-SpamFirewalls
Patch levelsSecured wireless routers
Global co-operation
Cross border co-operation
Education
Targeted advice to publicTailored advice to public
Tools
Secure e-mailIE7
Behavioural Analytics
Global co-operation
MoU between countries
Addressing the Threats – Three Pronged Approach
6Privacy in Cyberspace
Summary
• Government to sponsor public awareness
• ISPs to provide customers with toolkit
• Businesses to safeguard their customers’ information
• Consumers to use the tools available
Coherent - Cost-effective - Simple