SlideShare a Scribd company logo
1 of 36
Download to read offline
Security First: What It Means for Your Business 1Security First: What It Means for Your Business 1
What It Is and What It Means
for Your Business
Security First
Security First: What It Means for Your Business 2Security First: What It Means for Your Business 2
Security first
is a mindset.
It’s thinking about your company’s
security holistically from the ground up.
Security First: What It Means for Your Business 3Security First: What It Means for Your Business 3
That means looking beyond technical
considerations to see where security
fits into your:
Business model
Software development
People and hiring practices
Pricing
Approach to partnerships
Marketing
Research and innovation
✔
✔
✔
✔
✔
✔
✔
Security First: What It Means for Your Business 4
To do it right, security has to come
first in everything you do. It can’t
ever be an after thought.
Security First: What It Means for Your Business 5Security First: What It Means for Your Business 5
Putting security first not only
keeps your business safe,
it also helps you disrupt
your industry.
Security First: What It Means for Your Business 6
Just think of how innovative
companies are differentiating
themselves by focusing on
security and privacy.
Security First: What It Means for Your Business 7
Apple stands out
as a great example.
Security First: What It Means for Your Business 8Security First: What It Means for Your Business 8
They’ve taken a very public
and forward-thinking stance
on security and privacy.
Security First: What It Means for Your Business 9
“People would like you to
believe you have to give
up privacy to have AI
do something for you,
but we don’t buy that.
It might take more work,
it might take more thinking,
but I don’t think we should
throw our privacy away.”
– Tim Cook
Security First: What It Means for Your Business 10
Apple uses hardware protection
of encryption keys, end-to-end
encryption on iMessage and
differential privacy.
And it’s
more than
words…
Security First: What It Means for Your Business 11
And the strategy
is working!
Zero-day exploits for iOS
are now going for
big bucks.
Security First: What It Means for Your Business 12
“…I applaud Apple for trying to improve
privacy within its business models…”
– Bruce Schneier, internationally renowned security technologist
“The majority of enterprises still feel it
is easier for them to secure their
enterprise data on the iOS platform.”
– Dionisio Zumerle, Gartner
The reactions Apple
has been getting are
very favorable.
Security First: What It Means for Your Business 13
While Apple is a great
example of a company
that’s getting security
first right, most
companies don’t.
Security First: What It Means for Your Business 14
After Jeep Hack, Chrysler Recalls
1.4 Million Vehicles for Bug Fix
Target CEO Fired: Can You Be
Fired If Your Company Is Hacked?
Ransomware attacks to quadruple
in 2016, study finds
And that’s having
a major impact
in lots of ways.
Security First: What It Means for Your Business 15
Not only that, by 2020, the global
cost of cyber crimes is expected
to reach $2.5 trillion.
Security First: What It Means for Your Business 16Security First: What It Means for Your Business 16
To help put things
in perspective,
let’s take a quick look
at the history of
security threats.
Security First: What It Means for Your Business 17Security First: What It Means for Your Business 17
Little valuable data was online
Viruses weren’t a real threat
Crypto was for academics and geeks
1980s &
1990s
Back in the 1980s and 1990s,
there really wasn’t much going on.
2008 – 2016 Present Day2000s
✔
✔
✔
1980s & 1990s
Security First: What It Means for Your Business 18Security First: What It Means for Your Business 18
We had entered the age of
weaponized malware platforms.
Stuxnet attacks Iranian enrichment
Modular, updatable and extensible
malware
Botnets as a service
2000s
✔
✔
✔
2008 – 2016 Present Day2000s1980s & 1990s
By the 2000s, things had changed.
Security First: What It Means for Your Business 19Security First: What It Means for Your Business 19
2008 –
2016Anthem: Hacked Database
Included 78.8 Million People
2008 – 2016 Present Day2000s1980s & 1990s
And since 2008, we’ve seen an
onslaught of security mega breaches...
Security First: What It Means for Your Business 20Security First: What It Means for Your Business 20
Digitization of everything
Post-Snowden privacy mindset
End-to-end encryption in WhatsApp
Rise of blockchain and Bitcoin
2008 – 2016 Present Day2000s1980s & 1990s
✔
✔
✔
✔
Along with a variety of other
important changes.
2008 –
2016
Security First: What It Means for Your Business 21Security First: What It Means for Your Business 21
2008 – 2016 Present Day2000s1980s & 1990s
Differential privacy in mainstream
products
Blockchains everywhere
Passwordless authentication
Ransomware
IoT DDoS attacks
Present
Day
✔
✔
✔
✔
✔
Fast forward to present day,
and the changes keep coming.
Security First: What It Means for Your Business 22
Looking ahead at the
intersection of
security and artificial
intelligence (AI),
there will be challenges
and opportunities.
Security First: What It Means for Your Business 23Security First: What It Means for Your Business 23
The challenges will be
in terms of AI safety and
security, with hackers
potentially able to…
Security First: What It Means for Your Business 24
Convince a self-driving
car to swerve into
oncoming traffic.
Security First: What It Means for Your Business 25
Trick a bot into thinking
that someone else
requested a transaction.
Security First: What It Means for Your Business 26
Or make an industrial
system think that it’s
not overheating.
Security First: What It Means for Your Business 27Security First: What It Means for Your Business 27
There will also be opportunities
to utilize AI to increase cyber
security to...
Security First: What It Means for Your Business 28
Monitor and
detect events at
“beyond human”
scale.
Remove
human error from
writing and
patching code.
Human-like
pattern matching
for access
authorization.
Security First: What It Means for Your Business 29Security First: What It Means for Your Business 29
Automated detection, evaluation and patching.
The future is
arriving now:
Security First: What It Means for Your Business 30Security First: What It Means for Your Business 30
So what can you do to
help your company adopt
a security first mindset?
Security First: What It Means for Your Business 31
Here are three ideas
to start with:
Security First: What It Means for Your Business 32Security First: What It Means for Your Business 32
Make security decisions
early and often.1
Security First: What It Means for Your Business 33Security First: What It Means for Your Business 33
Build security into every
facet of your business.2
Security First: What It Means for Your Business 34Security First: What It Means for Your Business 34
Compliance is table
stakes. Go well beyond
security basics.
3
Security First: What It Means for Your Business 35
Last but not least, keep in mind that (good)
security is complex and that attackers are
adaptive and don’t play by the rules.
Security First: What It Means for Your Business 36Security First: What It Means for Your Business 36
Want to learn more
about security first?
Click here to listen to the podcast

More Related Content

What's hot

Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital spaceYves Sinka
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader ProblemPrivacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader ProblemMatthew Karnas
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slidesExponential_e
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignDr. Ann Cavoukian
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP Paribas(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP ParibasEnjoyDigitAll by BNP Paribas
 
Cloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLACloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLARaj Goel
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarConcept Searching, Inc
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)Ulf Mattsson
 
Understanding Blockchains
Understanding BlockchainsUnderstanding Blockchains
Understanding BlockchainsBlockStars.io
 

What's hot (20)

Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital space
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader ProblemPrivacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slides
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP Paribas(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP Paribas
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 
Cloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLACloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLA
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
 
Understanding Blockchains
Understanding BlockchainsUnderstanding Blockchains
Understanding Blockchains
 

Viewers also liked

11 Principles of Applied Analytics
11 Principles of Applied Analytics11 Principles of Applied Analytics
11 Principles of Applied AnalyticsGeorgian
 
Conversational Business - Trends
Conversational Business - TrendsConversational Business - Trends
Conversational Business - TrendsGeorgian
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security Bill Gibbs
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Cyber Security for Business Traveller
Cyber Security for Business TravellerCyber Security for Business Traveller
Cyber Security for Business TravellerRajneesh G
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleAndris Soroka
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Adam Ziaja
 
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...Sucuri
 
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?PwC Polska
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsCYBERWISER .eu
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011Arjun V
 
Machine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicMachine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicAmirali Charania
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your BusinessNeil Kemp
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNeha Gupta
 

Viewers also liked (20)

11 Principles of Applied Analytics
11 Principles of Applied Analytics11 Principles of Applied Analytics
11 Principles of Applied Analytics
 
Conversational Business - Trends
Conversational Business - TrendsConversational Business - Trends
Conversational Business - Trends
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Cyber Security for Business Traveller
Cyber Security for Business TravellerCyber Security for Business Traveller
Cyber Security for Business Traveller
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Information Security and your Business
Information Security and your BusinessInformation Security and your Business
Information Security and your Business
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)
 
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
The Business of Security: The Nitty Gritty of Running a Multi-Million Dollar ...
 
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
 
Machine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicMachine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magic
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your Business
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Security First: What it is and What it Means for Your Business

How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfonline Marketing
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfonline Marketing
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaStefan Streichsbier
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMRick Bouter
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
top 10 ethical hacking imaportance.pptx
top 10 ethical hacking imaportance.pptxtop 10 ethical hacking imaportance.pptx
top 10 ethical hacking imaportance.pptxNarangYadav
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016James_08
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Berezha Security Group
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 

Similar to Security First: What it is and What it Means for Your Business (20)

Pitss
PitssPitss
Pitss
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 
How AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdfHow AI is influencing cyber security for business - CyberHive.pdf
How AI is influencing cyber security for business - CyberHive.pdf
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
top 10 ethical hacking imaportance.pptx
top 10 ethical hacking imaportance.pptxtop 10 ethical hacking imaportance.pptx
top 10 ethical hacking imaportance.pptx
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 

Recently uploaded

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Security First: What it is and What it Means for Your Business

  • 1. Security First: What It Means for Your Business 1Security First: What It Means for Your Business 1 What It Is and What It Means for Your Business Security First
  • 2. Security First: What It Means for Your Business 2Security First: What It Means for Your Business 2 Security first is a mindset. It’s thinking about your company’s security holistically from the ground up.
  • 3. Security First: What It Means for Your Business 3Security First: What It Means for Your Business 3 That means looking beyond technical considerations to see where security fits into your: Business model Software development People and hiring practices Pricing Approach to partnerships Marketing Research and innovation ✔ ✔ ✔ ✔ ✔ ✔ ✔
  • 4. Security First: What It Means for Your Business 4 To do it right, security has to come first in everything you do. It can’t ever be an after thought.
  • 5. Security First: What It Means for Your Business 5Security First: What It Means for Your Business 5 Putting security first not only keeps your business safe, it also helps you disrupt your industry.
  • 6. Security First: What It Means for Your Business 6 Just think of how innovative companies are differentiating themselves by focusing on security and privacy.
  • 7. Security First: What It Means for Your Business 7 Apple stands out as a great example.
  • 8. Security First: What It Means for Your Business 8Security First: What It Means for Your Business 8 They’ve taken a very public and forward-thinking stance on security and privacy.
  • 9. Security First: What It Means for Your Business 9 “People would like you to believe you have to give up privacy to have AI do something for you, but we don’t buy that. It might take more work, it might take more thinking, but I don’t think we should throw our privacy away.” – Tim Cook
  • 10. Security First: What It Means for Your Business 10 Apple uses hardware protection of encryption keys, end-to-end encryption on iMessage and differential privacy. And it’s more than words…
  • 11. Security First: What It Means for Your Business 11 And the strategy is working! Zero-day exploits for iOS are now going for big bucks.
  • 12. Security First: What It Means for Your Business 12 “…I applaud Apple for trying to improve privacy within its business models…” – Bruce Schneier, internationally renowned security technologist “The majority of enterprises still feel it is easier for them to secure their enterprise data on the iOS platform.” – Dionisio Zumerle, Gartner The reactions Apple has been getting are very favorable.
  • 13. Security First: What It Means for Your Business 13 While Apple is a great example of a company that’s getting security first right, most companies don’t.
  • 14. Security First: What It Means for Your Business 14 After Jeep Hack, Chrysler Recalls 1.4 Million Vehicles for Bug Fix Target CEO Fired: Can You Be Fired If Your Company Is Hacked? Ransomware attacks to quadruple in 2016, study finds And that’s having a major impact in lots of ways.
  • 15. Security First: What It Means for Your Business 15 Not only that, by 2020, the global cost of cyber crimes is expected to reach $2.5 trillion.
  • 16. Security First: What It Means for Your Business 16Security First: What It Means for Your Business 16 To help put things in perspective, let’s take a quick look at the history of security threats.
  • 17. Security First: What It Means for Your Business 17Security First: What It Means for Your Business 17 Little valuable data was online Viruses weren’t a real threat Crypto was for academics and geeks 1980s & 1990s Back in the 1980s and 1990s, there really wasn’t much going on. 2008 – 2016 Present Day2000s ✔ ✔ ✔ 1980s & 1990s
  • 18. Security First: What It Means for Your Business 18Security First: What It Means for Your Business 18 We had entered the age of weaponized malware platforms. Stuxnet attacks Iranian enrichment Modular, updatable and extensible malware Botnets as a service 2000s ✔ ✔ ✔ 2008 – 2016 Present Day2000s1980s & 1990s By the 2000s, things had changed.
  • 19. Security First: What It Means for Your Business 19Security First: What It Means for Your Business 19 2008 – 2016Anthem: Hacked Database Included 78.8 Million People 2008 – 2016 Present Day2000s1980s & 1990s And since 2008, we’ve seen an onslaught of security mega breaches...
  • 20. Security First: What It Means for Your Business 20Security First: What It Means for Your Business 20 Digitization of everything Post-Snowden privacy mindset End-to-end encryption in WhatsApp Rise of blockchain and Bitcoin 2008 – 2016 Present Day2000s1980s & 1990s ✔ ✔ ✔ ✔ Along with a variety of other important changes. 2008 – 2016
  • 21. Security First: What It Means for Your Business 21Security First: What It Means for Your Business 21 2008 – 2016 Present Day2000s1980s & 1990s Differential privacy in mainstream products Blockchains everywhere Passwordless authentication Ransomware IoT DDoS attacks Present Day ✔ ✔ ✔ ✔ ✔ Fast forward to present day, and the changes keep coming.
  • 22. Security First: What It Means for Your Business 22 Looking ahead at the intersection of security and artificial intelligence (AI), there will be challenges and opportunities.
  • 23. Security First: What It Means for Your Business 23Security First: What It Means for Your Business 23 The challenges will be in terms of AI safety and security, with hackers potentially able to…
  • 24. Security First: What It Means for Your Business 24 Convince a self-driving car to swerve into oncoming traffic.
  • 25. Security First: What It Means for Your Business 25 Trick a bot into thinking that someone else requested a transaction.
  • 26. Security First: What It Means for Your Business 26 Or make an industrial system think that it’s not overheating.
  • 27. Security First: What It Means for Your Business 27Security First: What It Means for Your Business 27 There will also be opportunities to utilize AI to increase cyber security to...
  • 28. Security First: What It Means for Your Business 28 Monitor and detect events at “beyond human” scale. Remove human error from writing and patching code. Human-like pattern matching for access authorization.
  • 29. Security First: What It Means for Your Business 29Security First: What It Means for Your Business 29 Automated detection, evaluation and patching. The future is arriving now:
  • 30. Security First: What It Means for Your Business 30Security First: What It Means for Your Business 30 So what can you do to help your company adopt a security first mindset?
  • 31. Security First: What It Means for Your Business 31 Here are three ideas to start with:
  • 32. Security First: What It Means for Your Business 32Security First: What It Means for Your Business 32 Make security decisions early and often.1
  • 33. Security First: What It Means for Your Business 33Security First: What It Means for Your Business 33 Build security into every facet of your business.2
  • 34. Security First: What It Means for Your Business 34Security First: What It Means for Your Business 34 Compliance is table stakes. Go well beyond security basics. 3
  • 35. Security First: What It Means for Your Business 35 Last but not least, keep in mind that (good) security is complex and that attackers are adaptive and don’t play by the rules.
  • 36. Security First: What It Means for Your Business 36Security First: What It Means for Your Business 36 Want to learn more about security first? Click here to listen to the podcast