Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Protecting our customers - BT security

Presentation from the Jisc security conference 2016

www.jisc.ac.uk

  • Login to see the comments

  • Be the first to like this

Protecting our customers - BT security

  1. 1. Protecting our customers BT Security 1/11/2016
  2. 2. Protecting our Customers (Jisc Conference Nov 2016) BT Security, Protecting our Connected World.
  3. 3. 2 Talk on Incident Response…. Sort of BTID review and proactive operations so we don’t have incidents to respond to.
  4. 4. 3 Numerical Context 36,295 7 15 621,279 7MILLION 152,000
  5. 5. 4 4 Protecting Potential Victims 4 • Reactive Monitoring • Multiple access attempts from UK/Non-UK • Brute force attacks • etc • IP Blocking • Temporary due to reallocation issues • Intel Scanning • Process Review, can we do this better, what are we missing? • Mind set Change, don’t discount non-BT ID emails, collect all breaches and compare.
  6. 6. 5 • On average 3 username and password combinations • Passwords are like toothbrushes Username and Password Reuse 5 Choose a good one Never share Change regularly (Credit to Clifford Stoll) • Finally, use a different one for each username and password combination you have!
  7. 7. 6 QUESTIONS? Amy Lemberger BT CERT Team Leader amy.lemberger@bt.com BT, Dial House, Manchester
  8. 8. BT Assure. Security that matters.

×