SlideShare a Scribd company logo
1 of 17
Download to read offline
A Manifesto for
Cyber Resilience
Cyber DefinedUnknown
Unknowns
Fighting
Yesterday’s
battles Human Factor
Understand
whereyoustand
BYOD
Cyber Resilience Employee Threat
Revolutionaries
Cyber Resilience Defined
Some 2.4 billion global Internet users—34 percent of
the world’s population—spend increasing amounts
of time online.1
As our online activity expands,
it isn’t just creating new ways to do business. It’s
revolutionizing business. However, like any mass
movement with significant ramifications, the
Internet-enabled life has risks as well as benefits.
Some are willing to accept those risks without much
consideration. Others want to take the time for a
more contemplative response, but events are moving
too quickly for long debate. What we really need is
a Call to Action that addresses the risks demanding
urgent attention.
To balance the benefits of the digital life,
management needs to understand and grapple
with four equally powerful forces:
Democratization – The way customers insist
on interacting via the channels they prefer,
rather than the channels the organization
imposes.
Consumerization – The impact of the many
devices and applications that span work and
play in our digital lives.
Externalization – The ways in which cloud
computing slashes capital expenditure and
shakes up how data moves in and out of
organizations.
Digitization – The exponential connectivity
created when sensors and devices form the
“Internet of Things.”These forces interact in ways
that make eradicating Cyber Risk impossible;
eliminating it in one area simply shifts it to the
others.
However, by following best practices, it is possible
to reduce your organization’s exposure to Cyber
Risk across the board. By addressing the real and
growing risks we face as individuals, businesses, and
governments, we can begin to create an optimal
environment of Cyber Resilience. This Manifesto sets
out a road map for that process.
What We Know Today
Digital technology has become so inextricably
woven into our daily lives that doing without it has
become as unthinkable as going back in time. What
bank customer would be willing to give up the
ability to transfer money—even across international
borders—in milliseconds? What businessperson
would return to buying airline tickets at a counter
or placing business calls from a phone booth? And
with the advent of 3-D printing, what manufacturer
would pay shipping for a component it could print
onsite?
The rise of mobility is only accelerating these
trends. Although only 15 percent of the world’s
Internet traffic is currently mobile, that figure
is growing fast: of the world’s 5 billion mobile
phones, a third are Internet-enabled smartphones
whose users share 500 million photos daily and
check their messages an average of 23 times a
day.1
Yet the complex, fast-moving transactions
technology enables are also a potential minefield
for businesses.
Online attacks claim 1.5 million victims every
day and add up, conservatively, to $110 billion in
losses each year.2
Malware, or malicious software
attacks, on the web increased 23 percent in 2013
and on mobile devices grew 139 percent in the
same period.3
Crucially, of the websites serving
up malware, 67 percent were from legitimate sites
that had been compromised.3
Worried yet?
As desktop computer operating systems give way to
web-based and mobile platforms and applications,
criminals are evolving new digital threats to keep
pace. They’re also expanding their targets to include
organizations that lack the levels of security found
in the largest enterprises. Far from flying under the
radar of online threats, smaller companies are more
exposed than ever: 41 percent of attacks affect
organizations with fewer than 500 employees.2
And
while larger organizations may think themselves
well-protected, this focus on smaller companies
may result in their supply chain being infiltrated
from below.
As a result, changes in what security experts call the
“threat landscape”are as hard to predict as they are
to address.
The Unknown Unknowns
It is literally impossible to predict all the online
threats your organization will face, so your best
hope of combating them is to prepare for any
possibility. The people creating the threats may be
criminals, terrorists, state-sponsored cyberspies,
or disgruntled“hacktivists.”Their motivations
could be anything from peaceful protest to
malicious intent, political advantage to financial
gain, or any combination thereof.
What’s more, their ability to create and unleash
digital chaos is increasing exponentially. Only the
most knowledgeable of security experts have the
level of expertise shared in the“black economy.”
Your law-abiding organization is unlikely to receive
a backstage pass to this underground world where
hackers exchange stolen data, sell ready-made
malware kits, and develop new ways to secure
their operations.
The Human Factor
While 84 percent of data breaches occur in hours
or less, two-thirds aren’t discovered for months,
and 22 percent of us don’t manage to contain
them for months or even years.4
Why is this?
It isn’t a lack of technology. The newest, fastest,
shiniest hardware or software can be necessary
for your company’s digital security, yet still not
sufficient to ensure it. It’s the human factor—the
person reading this manifesto—that introduces
the greatest risk. You and I are the weakest link.
Part of the problem is IT’s changing role within the
organization. Although IT touches every department
and traditionally has primary responsibility for data
security, its ability to control what technology the
organization uses is slipping. While IT may still be
a trusted advisor in purchasing technology, it’s no
longer the gatekeeper: Recent research shows that
14 percent of cloud storage, 13 percent of social
media, and 11 percent of office productivity software
is implemented without the IT department’s
knowledge.5
In addition, Gartner data shows the
movement of IT spending to other departments is
already well under way. The marketing department
is a front-runner and due to outspend the IT
department on technology by 2017.6
In short, the human element of Cyber Risk
within your organization is likely to be higher
outside your IT department within it. As a result,
concentrating data security knowledge and
expertise in IT actually increases your risk, while
spreading the expertise—making your security
culture all-inclusive—is a worthwhile strategy for
reducing it.
initial compromises
take hours or less
breaches are
not discovered
for months
breaches take
months or longer
to contain
84%
66%
22%
Risk 1 Businesses Are Small
Compared to the Threat
Few organizations—even global multinationals—
have the resources to stay on top of all the digital
threats a highly motivated team of attackers can
mount. The bad guys are also smart guys. They
already have years of experience collaborating in
virtual teams across national boundaries for mutual
benefit, selling tricks to each other and trading
stolen identities. They’re launching today’s cross-
boundary, cross-platform attacks against security
systems built for yesterday’s pre-cloud, pre-mobile,
and sometimes even pre-Web, nation-based world.
Most cyberattacks remain comparatively
unsophisticated, and all but 10 percent of
organizations have enough security basics in
place to fend them off. However, 78 percent of
organizations use only the basic security resources
available online, with no customization.4
This leaves
them vulnerable to more sophisticated attacks—
especially under the traditional approach of buying
more security tools piecemeal. Organizations need
to obtain greater visibility into their organization’s
current security stance and react accordingly.
Moreover, as organizations pursue efficiency by
linking ever more systems together, using smart
meters to manage energy use, sensors to control
production lines, and RFID tags to track shipments,
attackers have an increasing number of targets
at their disposal—targets that aren’t in the IT
department, nor even human. Only a handful of
organizations, primarily in the defense sector, have
the bandwidth to spend all their time fighting digital
threats. The rest of us, processing insurance claims
or selling shoes or servicing cars, have to spend
wisely to become more Cyber Resilient—and, more
importantly, we have to follow our attackers’lead. By
banding together as the global community of“black
hats”have already done, we can pool resources,
share knowledge about the severity of threats, and
maybe even make it a fair fight.
Risk 2 Fighting yesterday’s
battles loses the war
As risks to data security have become more subtle,
personalized, and distributed, detecting them has
become increasingly difficult—it is impossible to
claim any IT system connected to the Internet (which
is to say, virtually all of them) is impregnable. It isn’t
just that human intelligence almost always bypasses
a“wall of steel.”Today’s smarter, more sophisticated
threats aren’t blunt full-frontal assaults. They’re
personalized. They attack many vulnerabilities
at once. And when they succeed, they’re more
devastating. Today’s attackers can plant a payload
by web, email, or mobile, then awaken it from
hibernation to create a zombie botnet that remains
on the infected system even after the infection is
detected and the method of infection eliminated.
Yesterday’s approach to data security, the isolated
removal of threats, needs to evolve into a slow,
determined, ongoing process of Cyber Resilience.
Instead of trying to block attacks, Cyber Resilience
is about making you a less attractive target: making
access to your systems difficult enough and
unprofitable enough to steer attackers to lower-
hanging fruit. With a deeper understanding of the
threats your organization faces, your organization
can assess its risks, choose the ones it’s willing to
take in pursuit of strategic advantage, and build its
defenses accordingly.
Risk 3 Ignoring the role of Employees
Employees are often cited as the greatest asset an
organization has. The reality is they can also be
the greatest liability from a security point of view.
Identity theft and the physical theft of unprotected
devices, often encouraged by today’s generous
BYOD policies, greatly complicate matters.
Where once security was the sole responsibility of
IT professionals, the pervasiveness of“shadow IT”
means it cannot be left to them alone. One person’s
non-sanctioned technology spending is another’s
fast track to innovation, and if IT professionals crack
down on them aggressively, they’re likely to be
seen less as protectors of data than as hindrances to
productivity.
Critically, research indicates that 53 percent of
employees believe that taking corporate data
“doesn’t harm the company,7
and 35 percent of all
data breaches originate internally, particularly with
individuals preparing to leave the organization.8
To address this, organizations need to train non-
technical employees in their security processes
as well as the ramifications and consequences of
ignoring them. By helping employees make wiser
decisions about the use of technology, organizations
can reduce unintentional malpractice and increase
the organization’s Cyber Resilience. This is not
an abdication of IT’s responsibility; it is, rather, a
chance to convert IT expertise into competitive
advantage. The idea is to empower non-technical
employees and reduce non-intentional malpractice.
Far from being an abdication of responsibility
by IT, here is a chance to convert IT expertise
into competitive advantage. There is a new deal
to be struck between non-IT professionals and
their more technical IT colleagues, showing
them how Cyber Resilience can increase their
organization’s potential. In Cyber, ignorance
is not bliss – it’s a communication and an
organizational challenge. In other words an
untapped commercial opportunity.
How To Become Cyber Resilient 1
Understand where your organization stands
A well-known management saying is“You cannot
manage what you cannot measure.”However, most
cyber attacks go unnoticed, never mind measured,
as are the risks they pose.4
How can we then
assess our level of risk?
The journey to Cyber Resilience should start with a
comprehensive external assessment of the people,
processes, and products involved in data security:
Establish a baseline with an independent
audit of the technology and processes your
organization uses as well as the vulnerabilities
in your security stance
Develop a benchmark to compare your results
to that of your peers
Conduct a gap analysis between where you
are and where you want to be to develop
practical, strategic recommendations
By taking these steps, you begin to transform your
“unknown unknowns”into visible action items and
prioritize them, not just for your IT department,
but also across the entire organization. Your
analysis reveals the organization’s vulnerabilities,
helps you spot the most urgent and/or pressing
issues first, and suggests ways to address them
and thus make your organization less appealing as
a target for attackers.
12
Once upon a time, computers were hard to move,
difficult to use, and managed by only a few people.
Things have changed. Now your employees can
carry business-critical, confidential data in their
pockets—and so can employees of your business
partners, and their business partners, and so on.
The genie of data is out of the bottle, and your
best practices for on-premise data security can
only protect you to the extent that the least secure
person in possession of your data follows them.
Writing and enforcing password policies, locking
down devices, and complying with ISO standards
will only boost your Cyber Resilience if you can
ensure everyone from your contract cleaners and
external caterers to your auditors and attorneys also
adheres to the same policies.
As already mentioned, analysts predict that in the
near future, more IT spending will take place outside
of IT than within it—and even people who have
spent their entire careers in IT are unlikely to be
prepared for the continuing changes the explosive
growth of Internet-enabled technology is bringing
to the business world. It’s time to think outside of
the box, outside of the IT department, outside of
job descriptions, and outside of your organizational
boundaries.
Drop the tech speak, drop the security jargon,
and reach out to your colleagues—all of them.
Everyone who works with your organization needs
to understand what digital security is, why it’s
important, and what they need to do to uphold it.
How To Become Cyber Resilient 2
Coaching your colleagues, ALL of them
Your enemies are many, unseen, and clever, made
of components that can form, morph, and dissolve
fluidly as needed. Don’t try to battle them alone.
Join forces with other organizations that share your
security concerns. Pool your IT security intelligence
and skills to develop joint strategies that can flex
and scale with the constant, ever-changing nature of
the threat. A security vendor with a comprehensive
security intelligence network provides a holistic
overview of emerging threats across companies,
industries, and continents, while an incident
response service offers expertise when you need it.
Instead of putting out fires and being the one to
blame when things go wrong, IT at the heart of a
Cyber Resilient organization is proactive, gathering
security intelligence from existing security
controls and technologies that already exist in
your environment. This intelligence allows you to
not only respond to attacks, but also to gauge the
organization’s ability to fend off threats so executive
leaders can make well-informed decisions regarding
their cyber security strategy.
How To Become Cyber Resilient 3
Make Cyber Resilience your
competitive advantage
Conclusion
Futurist and novelist Arthur C. Clarke famously
wrote,“Any sufficiently advanced technology
is indistinguishable from magic.”The online
revolution has produced results that just a few
years ago would have been virtually magical, all
because of the ability to send and receive data
securely. That security has become too central
to our daily lives not to take with the utmost
seriousness—the same level of seriousness we give
to power, water, talent, and other vital real-world
inputs on which the comforts of our personal lives
and the stability of our global systems depend.
No top-down edict is enough to mitigate the risks;
technology moves too fast. Only an informed but
flexible grass roots movement can keep up with
the threats to our digital assets. It’s up to you and
other IT professionals to lead the way:
1. Setting a baseline for your organization’s
current Cyber Resilience, effectively and soon.
2. Enlisting everyone in your organization’s
supply chain in the effort, educating him or
her about the need to balance innovation with
security.
3. Leveraging the concepts behind Cyber
Resilience and making use of all of your
security intelligence for long-term competitive
advantage and protection.
We hope this Manifesto will start the chain reaction
necessary to get your organization moving down the
path to Cyber Resilience. If it has, contact the experts
at Symantec for further assistance; our assessment
and security products and services can help you take
the next steps.
Cyber
Resilience
Define
Cyber
Baseline
BYOD
Cloud
IT
Business
Supply Chain
Today
On Premise
Core IP
Educated
Workforce
Future
Supply Chain
Cloud
Outsourced
Transition
Tomorrow
Cyber
Threats
Impact
Evolution
Legacy
Approach
Strategic
Resilience
References
Unstoppable movements start revolutions.
Our products and services are acknowledged
to be at the leading edge of Cyber knowledge
and Symantec would like to engage with your
Cyber efforts.
Share today, be part of the resistance.
1 – Mary Meeker, KPCB, 2013 Internet Trends
2 – Norton Cybercrime Report
3 – Symantec ISTR 2013
4 – Verizon DBIR 2013
5 – Economist Intelligence unit July 2013‘Security Empowers
Business – unlock the power of a protected enterprise’
6 – Gartner Webinar January 2013‘By 2017 the CMO will
spend more than the CIO’by Laura McLellan
7 – Symantec‘What’s Yours is Mine: How Employees are
Putting Your IP at Risk’paper 2013
8 – Symantec‘Cost of a Data Breach Study 2013’
Contacts
Symantec protects the world’s information,
and is a global leader in security, backup, and
availability solutions. Our innovative products
and services protect people and information
in any environment – from the smallest mobile
device, to the enterprise data center, to cloud-
based systems. Our world-renowned expertise
in protecting data, identities, and interactions
gives our customers confidence in a connected
world. More information is available at www.
symantec.com or by connecting with Symantec
at go.symantec.com/cyber-resilience.
Copyright © 2014 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, and the Checkmark Logo are
trademarks or registered trademarks of Symantec Corporation
or its affiliates in the U.S. and other countries. Other names
may be trademarks of their respective owners. 05/14 21330419
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
www.symantec.com

More Related Content

What's hot

Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty VisualizationDoug Cogswell
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisitionChristopher Dorobek
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 

What's hot (20)

Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisition
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 

Viewers also liked

Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing John Weiler
 
Design of matched filter for radar applications
Design of matched filter for radar  applicationsDesign of matched filter for radar  applications
Design of matched filter for radar applicationselelijjournal
 
If more were less - how incremental are affiliate sales? Matt Swan and Kevin ...
If more were less - how incremental are affiliate sales? Matt Swan and Kevin ...If more were less - how incremental are affiliate sales? Matt Swan and Kevin ...
If more were less - how incremental are affiliate sales? Matt Swan and Kevin ...auexpo Conference
 
Un-broken Logging - Operability.io 2015 - Matthew Skelton
Un-broken Logging - Operability.io 2015 - Matthew SkeltonUn-broken Logging - Operability.io 2015 - Matthew Skelton
Un-broken Logging - Operability.io 2015 - Matthew SkeltonSkelton Thatcher Consulting Ltd
 
Attack-driven defense
Attack-driven defenseAttack-driven defense
Attack-driven defenseZane Lackey
 
Bitcoinを技術的に理解する
Bitcoinを技術的に理解するBitcoinを技術的に理解する
Bitcoinを技術的に理解するKenji Urushima
 
10 Things CEOs Need to Know About Design
10 Things CEOs Need to Know About Design 10 Things CEOs Need to Know About Design
10 Things CEOs Need to Know About Design Jason Putorti
 
Pm arabic ch7 الموارد البشریة وإدارة فریق المشروع
Pm arabic ch7 الموارد البشریة وإدارة فریق المشروعPm arabic ch7 الموارد البشریة وإدارة فریق المشروع
Pm arabic ch7 الموارد البشریة وإدارة فریق المشروعkhalid Dahleez
 

Viewers also liked (11)

Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing
 
Cyber Resilience @ Dundee & Angus College
Cyber Resilience @ Dundee & Angus CollegeCyber Resilience @ Dundee & Angus College
Cyber Resilience @ Dundee & Angus College
 
Design of matched filter for radar applications
Design of matched filter for radar  applicationsDesign of matched filter for radar  applications
Design of matched filter for radar applications
 
If more were less - how incremental are affiliate sales? Matt Swan and Kevin ...
If more were less - how incremental are affiliate sales? Matt Swan and Kevin ...If more were less - how incremental are affiliate sales? Matt Swan and Kevin ...
If more were less - how incremental are affiliate sales? Matt Swan and Kevin ...
 
OpenNLP demo
OpenNLP demoOpenNLP demo
OpenNLP demo
 
Un-broken Logging - Operability.io 2015 - Matthew Skelton
Un-broken Logging - Operability.io 2015 - Matthew SkeltonUn-broken Logging - Operability.io 2015 - Matthew Skelton
Un-broken Logging - Operability.io 2015 - Matthew Skelton
 
Fs2 6
Fs2 6Fs2 6
Fs2 6
 
Attack-driven defense
Attack-driven defenseAttack-driven defense
Attack-driven defense
 
Bitcoinを技術的に理解する
Bitcoinを技術的に理解するBitcoinを技術的に理解する
Bitcoinを技術的に理解する
 
10 Things CEOs Need to Know About Design
10 Things CEOs Need to Know About Design 10 Things CEOs Need to Know About Design
10 Things CEOs Need to Know About Design
 
Pm arabic ch7 الموارد البشریة وإدارة فریق المشروع
Pm arabic ch7 الموارد البشریة وإدارة فریق المشروعPm arabic ch7 الموارد البشریة وإدارة فریق المشروع
Pm arabic ch7 الموارد البشریة وإدارة فریق المشروع
 

Similar to A Manifesto for Cyber Resilience

CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemAustin Eppstein
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalCMR WORLD TECH
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 

Similar to A Manifesto for Cyber Resilience (20)

Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

A Manifesto for Cyber Resilience

  • 1. A Manifesto for Cyber Resilience Cyber DefinedUnknown Unknowns Fighting Yesterday’s battles Human Factor Understand whereyoustand BYOD Cyber Resilience Employee Threat Revolutionaries
  • 2. Cyber Resilience Defined Some 2.4 billion global Internet users—34 percent of the world’s population—spend increasing amounts of time online.1 As our online activity expands, it isn’t just creating new ways to do business. It’s revolutionizing business. However, like any mass movement with significant ramifications, the Internet-enabled life has risks as well as benefits. Some are willing to accept those risks without much consideration. Others want to take the time for a more contemplative response, but events are moving too quickly for long debate. What we really need is a Call to Action that addresses the risks demanding urgent attention. To balance the benefits of the digital life, management needs to understand and grapple with four equally powerful forces: Democratization – The way customers insist on interacting via the channels they prefer, rather than the channels the organization imposes. Consumerization – The impact of the many devices and applications that span work and play in our digital lives. Externalization – The ways in which cloud computing slashes capital expenditure and shakes up how data moves in and out of organizations. Digitization – The exponential connectivity created when sensors and devices form the “Internet of Things.”These forces interact in ways that make eradicating Cyber Risk impossible; eliminating it in one area simply shifts it to the others. However, by following best practices, it is possible to reduce your organization’s exposure to Cyber Risk across the board. By addressing the real and growing risks we face as individuals, businesses, and governments, we can begin to create an optimal environment of Cyber Resilience. This Manifesto sets out a road map for that process.
  • 3. What We Know Today Digital technology has become so inextricably woven into our daily lives that doing without it has become as unthinkable as going back in time. What bank customer would be willing to give up the ability to transfer money—even across international borders—in milliseconds? What businessperson would return to buying airline tickets at a counter or placing business calls from a phone booth? And with the advent of 3-D printing, what manufacturer would pay shipping for a component it could print onsite? The rise of mobility is only accelerating these trends. Although only 15 percent of the world’s Internet traffic is currently mobile, that figure is growing fast: of the world’s 5 billion mobile phones, a third are Internet-enabled smartphones whose users share 500 million photos daily and check their messages an average of 23 times a day.1 Yet the complex, fast-moving transactions technology enables are also a potential minefield for businesses. Online attacks claim 1.5 million victims every day and add up, conservatively, to $110 billion in losses each year.2 Malware, or malicious software attacks, on the web increased 23 percent in 2013 and on mobile devices grew 139 percent in the same period.3 Crucially, of the websites serving up malware, 67 percent were from legitimate sites that had been compromised.3
  • 4. Worried yet? As desktop computer operating systems give way to web-based and mobile platforms and applications, criminals are evolving new digital threats to keep pace. They’re also expanding their targets to include organizations that lack the levels of security found in the largest enterprises. Far from flying under the radar of online threats, smaller companies are more exposed than ever: 41 percent of attacks affect organizations with fewer than 500 employees.2 And while larger organizations may think themselves well-protected, this focus on smaller companies may result in their supply chain being infiltrated from below. As a result, changes in what security experts call the “threat landscape”are as hard to predict as they are to address.
  • 5. The Unknown Unknowns It is literally impossible to predict all the online threats your organization will face, so your best hope of combating them is to prepare for any possibility. The people creating the threats may be criminals, terrorists, state-sponsored cyberspies, or disgruntled“hacktivists.”Their motivations could be anything from peaceful protest to malicious intent, political advantage to financial gain, or any combination thereof. What’s more, their ability to create and unleash digital chaos is increasing exponentially. Only the most knowledgeable of security experts have the level of expertise shared in the“black economy.” Your law-abiding organization is unlikely to receive a backstage pass to this underground world where hackers exchange stolen data, sell ready-made malware kits, and develop new ways to secure their operations.
  • 6. The Human Factor While 84 percent of data breaches occur in hours or less, two-thirds aren’t discovered for months, and 22 percent of us don’t manage to contain them for months or even years.4 Why is this? It isn’t a lack of technology. The newest, fastest, shiniest hardware or software can be necessary for your company’s digital security, yet still not sufficient to ensure it. It’s the human factor—the person reading this manifesto—that introduces the greatest risk. You and I are the weakest link. Part of the problem is IT’s changing role within the organization. Although IT touches every department and traditionally has primary responsibility for data security, its ability to control what technology the organization uses is slipping. While IT may still be a trusted advisor in purchasing technology, it’s no longer the gatekeeper: Recent research shows that 14 percent of cloud storage, 13 percent of social media, and 11 percent of office productivity software is implemented without the IT department’s knowledge.5 In addition, Gartner data shows the movement of IT spending to other departments is already well under way. The marketing department is a front-runner and due to outspend the IT department on technology by 2017.6 In short, the human element of Cyber Risk within your organization is likely to be higher outside your IT department within it. As a result, concentrating data security knowledge and expertise in IT actually increases your risk, while spreading the expertise—making your security culture all-inclusive—is a worthwhile strategy for reducing it.
  • 7. initial compromises take hours or less breaches are not discovered for months breaches take months or longer to contain 84% 66% 22%
  • 8. Risk 1 Businesses Are Small Compared to the Threat Few organizations—even global multinationals— have the resources to stay on top of all the digital threats a highly motivated team of attackers can mount. The bad guys are also smart guys. They already have years of experience collaborating in virtual teams across national boundaries for mutual benefit, selling tricks to each other and trading stolen identities. They’re launching today’s cross- boundary, cross-platform attacks against security systems built for yesterday’s pre-cloud, pre-mobile, and sometimes even pre-Web, nation-based world. Most cyberattacks remain comparatively unsophisticated, and all but 10 percent of organizations have enough security basics in place to fend them off. However, 78 percent of organizations use only the basic security resources available online, with no customization.4 This leaves them vulnerable to more sophisticated attacks— especially under the traditional approach of buying more security tools piecemeal. Organizations need to obtain greater visibility into their organization’s current security stance and react accordingly. Moreover, as organizations pursue efficiency by linking ever more systems together, using smart meters to manage energy use, sensors to control production lines, and RFID tags to track shipments, attackers have an increasing number of targets at their disposal—targets that aren’t in the IT department, nor even human. Only a handful of organizations, primarily in the defense sector, have the bandwidth to spend all their time fighting digital threats. The rest of us, processing insurance claims or selling shoes or servicing cars, have to spend wisely to become more Cyber Resilient—and, more importantly, we have to follow our attackers’lead. By banding together as the global community of“black hats”have already done, we can pool resources, share knowledge about the severity of threats, and maybe even make it a fair fight.
  • 9. Risk 2 Fighting yesterday’s battles loses the war As risks to data security have become more subtle, personalized, and distributed, detecting them has become increasingly difficult—it is impossible to claim any IT system connected to the Internet (which is to say, virtually all of them) is impregnable. It isn’t just that human intelligence almost always bypasses a“wall of steel.”Today’s smarter, more sophisticated threats aren’t blunt full-frontal assaults. They’re personalized. They attack many vulnerabilities at once. And when they succeed, they’re more devastating. Today’s attackers can plant a payload by web, email, or mobile, then awaken it from hibernation to create a zombie botnet that remains on the infected system even after the infection is detected and the method of infection eliminated. Yesterday’s approach to data security, the isolated removal of threats, needs to evolve into a slow, determined, ongoing process of Cyber Resilience. Instead of trying to block attacks, Cyber Resilience is about making you a less attractive target: making access to your systems difficult enough and unprofitable enough to steer attackers to lower- hanging fruit. With a deeper understanding of the threats your organization faces, your organization can assess its risks, choose the ones it’s willing to take in pursuit of strategic advantage, and build its defenses accordingly.
  • 10. Risk 3 Ignoring the role of Employees Employees are often cited as the greatest asset an organization has. The reality is they can also be the greatest liability from a security point of view. Identity theft and the physical theft of unprotected devices, often encouraged by today’s generous BYOD policies, greatly complicate matters. Where once security was the sole responsibility of IT professionals, the pervasiveness of“shadow IT” means it cannot be left to them alone. One person’s non-sanctioned technology spending is another’s fast track to innovation, and if IT professionals crack down on them aggressively, they’re likely to be seen less as protectors of data than as hindrances to productivity. Critically, research indicates that 53 percent of employees believe that taking corporate data “doesn’t harm the company,7 and 35 percent of all data breaches originate internally, particularly with individuals preparing to leave the organization.8 To address this, organizations need to train non- technical employees in their security processes as well as the ramifications and consequences of ignoring them. By helping employees make wiser decisions about the use of technology, organizations can reduce unintentional malpractice and increase the organization’s Cyber Resilience. This is not an abdication of IT’s responsibility; it is, rather, a chance to convert IT expertise into competitive advantage. The idea is to empower non-technical employees and reduce non-intentional malpractice. Far from being an abdication of responsibility by IT, here is a chance to convert IT expertise into competitive advantage. There is a new deal to be struck between non-IT professionals and their more technical IT colleagues, showing them how Cyber Resilience can increase their organization’s potential. In Cyber, ignorance is not bliss – it’s a communication and an organizational challenge. In other words an untapped commercial opportunity.
  • 11. How To Become Cyber Resilient 1 Understand where your organization stands A well-known management saying is“You cannot manage what you cannot measure.”However, most cyber attacks go unnoticed, never mind measured, as are the risks they pose.4 How can we then assess our level of risk? The journey to Cyber Resilience should start with a comprehensive external assessment of the people, processes, and products involved in data security: Establish a baseline with an independent audit of the technology and processes your organization uses as well as the vulnerabilities in your security stance Develop a benchmark to compare your results to that of your peers Conduct a gap analysis between where you are and where you want to be to develop practical, strategic recommendations By taking these steps, you begin to transform your “unknown unknowns”into visible action items and prioritize them, not just for your IT department, but also across the entire organization. Your analysis reveals the organization’s vulnerabilities, helps you spot the most urgent and/or pressing issues first, and suggests ways to address them and thus make your organization less appealing as a target for attackers.
  • 12. 12 Once upon a time, computers were hard to move, difficult to use, and managed by only a few people. Things have changed. Now your employees can carry business-critical, confidential data in their pockets—and so can employees of your business partners, and their business partners, and so on. The genie of data is out of the bottle, and your best practices for on-premise data security can only protect you to the extent that the least secure person in possession of your data follows them. Writing and enforcing password policies, locking down devices, and complying with ISO standards will only boost your Cyber Resilience if you can ensure everyone from your contract cleaners and external caterers to your auditors and attorneys also adheres to the same policies. As already mentioned, analysts predict that in the near future, more IT spending will take place outside of IT than within it—and even people who have spent their entire careers in IT are unlikely to be prepared for the continuing changes the explosive growth of Internet-enabled technology is bringing to the business world. It’s time to think outside of the box, outside of the IT department, outside of job descriptions, and outside of your organizational boundaries. Drop the tech speak, drop the security jargon, and reach out to your colleagues—all of them. Everyone who works with your organization needs to understand what digital security is, why it’s important, and what they need to do to uphold it. How To Become Cyber Resilient 2 Coaching your colleagues, ALL of them
  • 13. Your enemies are many, unseen, and clever, made of components that can form, morph, and dissolve fluidly as needed. Don’t try to battle them alone. Join forces with other organizations that share your security concerns. Pool your IT security intelligence and skills to develop joint strategies that can flex and scale with the constant, ever-changing nature of the threat. A security vendor with a comprehensive security intelligence network provides a holistic overview of emerging threats across companies, industries, and continents, while an incident response service offers expertise when you need it. Instead of putting out fires and being the one to blame when things go wrong, IT at the heart of a Cyber Resilient organization is proactive, gathering security intelligence from existing security controls and technologies that already exist in your environment. This intelligence allows you to not only respond to attacks, but also to gauge the organization’s ability to fend off threats so executive leaders can make well-informed decisions regarding their cyber security strategy. How To Become Cyber Resilient 3 Make Cyber Resilience your competitive advantage
  • 14. Conclusion Futurist and novelist Arthur C. Clarke famously wrote,“Any sufficiently advanced technology is indistinguishable from magic.”The online revolution has produced results that just a few years ago would have been virtually magical, all because of the ability to send and receive data securely. That security has become too central to our daily lives not to take with the utmost seriousness—the same level of seriousness we give to power, water, talent, and other vital real-world inputs on which the comforts of our personal lives and the stability of our global systems depend. No top-down edict is enough to mitigate the risks; technology moves too fast. Only an informed but flexible grass roots movement can keep up with the threats to our digital assets. It’s up to you and other IT professionals to lead the way: 1. Setting a baseline for your organization’s current Cyber Resilience, effectively and soon. 2. Enlisting everyone in your organization’s supply chain in the effort, educating him or her about the need to balance innovation with security. 3. Leveraging the concepts behind Cyber Resilience and making use of all of your security intelligence for long-term competitive advantage and protection. We hope this Manifesto will start the chain reaction necessary to get your organization moving down the path to Cyber Resilience. If it has, contact the experts at Symantec for further assistance; our assessment and security products and services can help you take the next steps.
  • 15. Cyber Resilience Define Cyber Baseline BYOD Cloud IT Business Supply Chain Today On Premise Core IP Educated Workforce Future Supply Chain Cloud Outsourced Transition Tomorrow Cyber Threats Impact Evolution Legacy Approach Strategic Resilience
  • 16. References Unstoppable movements start revolutions. Our products and services are acknowledged to be at the leading edge of Cyber knowledge and Symantec would like to engage with your Cyber efforts. Share today, be part of the resistance. 1 – Mary Meeker, KPCB, 2013 Internet Trends 2 – Norton Cybercrime Report 3 – Symantec ISTR 2013 4 – Verizon DBIR 2013 5 – Economist Intelligence unit July 2013‘Security Empowers Business – unlock the power of a protected enterprise’ 6 – Gartner Webinar January 2013‘By 2017 the CMO will spend more than the CIO’by Laura McLellan 7 – Symantec‘What’s Yours is Mine: How Employees are Putting Your IP at Risk’paper 2013 8 – Symantec‘Cost of a Data Breach Study 2013’
  • 17. Contacts Symantec protects the world’s information, and is a global leader in security, backup, and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud- based systems. Our world-renowned expertise in protecting data, identities, and interactions gives our customers confidence in a connected world. More information is available at www. symantec.com or by connecting with Symantec at go.symantec.com/cyber-resilience. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 05/14 21330419 Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA www.symantec.com