2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection
-
Upload
andris-soroka -
Category
Business
-
view
308 -
download
2
Transcript of 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection
![Page 1: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/1.jpg)
Security Intelligence
for business data
protection
Andris Soroka2015, Riga
Riga, Latvia
![Page 2: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/2.jpg)
“Data Security Solutions” business cardWhat We Do?
DSS
ICT Security Provider
Advisory, Consulting, Installation,
Support
Most Innovative Portfolio in
BalticsMember–
ships, Awareness
Rising
Technology &
Knowledge Transfer
ICT Security
Evangelists
Endpoints
Applications
Networks
Data
Identity
Mobility
Management
Cloud
![Page 3: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/3.jpg)
DSS Global Partnerships
![Page 4: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/4.jpg)
DSS Delivering Excellent ICT Security Operatitions to its Customers
Customer ICT Security
Operations Excellence
Cooperation with Industry Top Technology
Leaders Recognised by Gartner, IDC,
Forester
Top level ICT Security
Professionals
Selected Cutting Edge ICT Security Innovative
TechnologyIntegration
Pan-Baltic
Projects
Particular Focus on Security
![Page 5: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/5.jpg)
Our international cyber security conference
In 2015 included in World Summit of Information Society Prize candidates.
Online voting is ON.
C5 – building theConfidence in Security in the use of ICT.
![Page 6: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/6.jpg)
Political (external and internal)
Technological (risks, threats, fraud, attacks, leaks)
Economical (budget reality, competition, costs…)
Legal (compliances, regulations etc.)
Professional (HR, information quantity)
Psychological ( traditions / knowledge / trust)
Challenges of C-level executives
![Page 7: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/7.jpg)
![Page 8: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/8.jpg)
Trends of the digital future
![Page 9: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/9.jpg)
Cyber security future is now ..
![Page 10: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/10.jpg)
![Page 11: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/11.jpg)
![Page 12: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/12.jpg)
LogManageme
nt
Security Intelligence
Network Activity
Monitoring
RiskManageme
nt
Vulnerability
Management
Network Forensics
![Page 13: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/13.jpg)
Suspected
Incidents
Prioritized Incidents
Servers and mainframes
Data activity
Network and virtual activity
Application activity
Configuration information
Security devices
Users and identities
Vulnerabilities and threats
Global threat intelligence
Extensive Data Sources
AutomatedOffenseIdentification
•Massive data reduction
•Automated data collection,
asset discovery and profiling
•Automated, real-time,
and integrated analytics
•Activity baselining
and anomaly detection
•Out-of-the box rules
and templatesEmbedded
Intelligence
Security intelligence for automated offense detection
![Page 14: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/14.jpg)
Prevent. Detect. Respond.
![Page 15: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/15.jpg)
![Page 16: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/16.jpg)
Business part
Business processes analysis from tech perspective
Assessment and management of cyber security risks
Related technological part
Inventory of devices and software
Secure configuration of everything (end-users, devices)
Vulnerability assessment and management
Malware defenses, application security, pen tests
Wifi security
Mobile security
Data security
Continuos skills training and learning
Access control and visibility
Audit, monitoring, analysis, incident response and more
Business & technology must come together
![Page 17: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/17.jpg)
![Page 18: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/18.jpg)
How we can help
Analyze and detect risks
Fulfill audit
Build security action plan
Train the employees
Pass compliance regulations
Save from data leakage
Protect critical assets
Get rid of passwords
Consult Your professionals
Protect from attacks
Help creating RFP docs
Be Your IT Security Advisor!
Business value of «Data Security Solutions»
![Page 19: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/19.jpg)
Balancing costs and risk – floods happen..
![Page 20: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/20.jpg)
Contact UsAndris [email protected]
Mob. +371 29162784
Riga, Latviawww.dss.lvLinkedIn: http://lv.linkedin.com/in/andsor
Twitter: @andris_soroka / @dss_it_security
Facebook: http://www.facebook.com/lvdss
Youtube: http://ow.ly/FAfEN
SlideShare: http://www.slideshare.net/andsor
![Page 21: 2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Protection](https://reader031.fdocuments.us/reader031/viewer/2022032611/55a6c5b41a28ab95428b48b8/html5/thumbnails/21.jpg)
Think Security FirstThank you