cytegic presentation 02 12
Post on 15-Apr-2017
277 Views
Preview:
TRANSCRIPT
www.cytegic.com
Company ConfidentialThis presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice.
Cytegic Cyber Security Management Solution
15-12-02
| Proprietary & Confidential
Agenda
2
1. Introduction2. Your Needs3. Cytegic Solution4. Next Steps
| Proprietary & Confidential
Why Cybersecurity Management Solutions?
3
“JPMorgan Chase will have spent more than $250 million annually on cybersecurity by the end of 2014, with approximately 1,000 people focused on the initiative. This effort will continue to grow exponentially over the years" Jamie Dimon
76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. -PWC
87% of US chief executives said they were worried that cyber threats could impact growth prospects, up from 69% the year before.- PWC
Cybersecurity management requires day-to-day operational commitment to transform from reactive to pro-active!
| Proprietary & Confidential
Business Focus
4
Cytegic is a must have - the flood of threat intelligence and defensive information can no longer be analysed manually
Cytegic provides multiple facets of an end-to-end - cyber risk and security management solution
Common language for cyber risk and security professionals – both operationally and strategically Monitor threats and maturity of defences
Measure adherence to compliance standards both internal and external on a day to day basis
Manage and fully optimize cybersecurity posture
| Proprietary & Confidential
Cytegic Integrated Solution
5
Dynamic Trend
Analysis
Cyber Maturity
Assessment
Cyber Decision
Support System
www.cytegic.com
Cyber Risk Management Facet
6
Evaluate ExposureDetermine Risk Appetite
| Proprietary & Confidential
Risk – Executive Screen
EnterpriseRisk
Environment Risks
QuantifiedImpact
HistoricalRisk
Business Asset
Risk Trend
Risk Score Actual
Risk Threshold
Impact Amount $
| Proprietary & Confidential
Risk – CRO Screen
• Build own thresholds
• Good practice risk sources
Confidentiality Integrity Availability
www.cytegic.com
Cyber Security Management Facet
9
Explore the Organization
| Proprietary & Confidential
CISO Screen – Enterprise View
10
Enterprise Risk Index Enterprise Assets at Risk
Threats to the Enterprise Defensive Controls Importance
Environments Risk Index
| Proprietary & Confidential
CISO Screen – Environment Controls
11
| Proprietary & Confidential
Controls – Prioritized for Improvement
12
The Control Gauge
Color Bar = Relative Importance
Grey Bar = Maturity Score %
Infrastructure Controls
Preventative Controls
Detective Controls
| Proprietary & Confidential
CyMA Environment Control Maturities
13
Control Maturities
• Environment View• Drill down to Criteria• Input to Threat
Analysis in CDSS• Contextual• Simulations
| Proprietary & Confidential
CyMA Control Maturities
14
Detailed Control Analysis
• Automated collection of control configuration facts
• Drill down to criteria• Sort and Rank• Eliminate from analysis if
not implemented
www.cytegic.com
Threat Intelligence Facet
15
Geo-Political SpecificityIndustry Sector Specificity
| Proprietary & Confidential 16
Remote Terminal Server
CISO Screen - Threats
What Threat Agents are we facing?
What Attack Methods are we susceptible to?
Systems
Software
Facilities
| Proprietary & Confidential
Trends in the Threats Landscape
17
The Threat Agents
The Attack Methods
| Proprietary & Confidential
DyTA Relevant Threat Levels
18
Threat Agents
Relevant Attack Methods
| Proprietary & Confidential
DyTA Threat Charts
Attackers Activity over time with filters for:
• Use of Attack Methods• Targeted Assets• Geo Region Targets• Industry Segment Activity
www.cytegic.com
Environments & Business Assets Facet
20
How will these threats and securityposture affect my organization?
| Proprietary & Confidential
CDSS - Business Risk
21
| Proprietary & Confidential
Overall Risk Scores
22
Environment Threat Level Asset Threat Level
Increased Attacker Activity will increase over all Threat Levels Increased Control Maturities will decrease over all Threat Levels
| Proprietary & Confidential
CDSS User Interface – Analysis & Simulations
23
25.00 - Low 25.00 - Low
| Proprietary & Confidential
Risk – CRO Screen – Mission Accomplished
EnterpriseRisk
Environment Risks
QuantifiedImpact
HistoricalRisk
Business Asset
Risk Trend
Risk Score Actual
Risk Threshold
Impact Amount $Acceptable
Risk Levels
| Proprietary & Confidential
Cytegic an End-to-End Solution A must have for ensuring the safety of your business assets
Operational and Actionable
Exposure and Compliance
Strategic Risk Appetite
CRO CISO C-Suite
| Proprietary & Confidential
Case Study – CDSS
26
The CISO of a large bank wished to perform cybersecurity assessments regarding the impact of migrating the CRM to the Cloud.Key requirements were:
• Independent assessment capability
• Quick implementation (a technical assessment of new technology was due)
• Ability to conduct dynamic assessments using up to date intelligence. Results:
Decision to utilize cloud technology
Improve buy- in with the management; justify IT security spending using
real data
Conduct frequent assessments without
having to rely on extremal auditors and / or additional
budget
Produced unbiased results
| Proprietary & Confidential
Thank you
27
www.cytegic.cominfo@cytegic.com
US Office:Suite #200411 Hackensack Ave. Hackensack, NJ 07601USA
Israel Office:Suite #60139 Sha’ul HaMelech Blvd Tel-Aviv, 64928Israel
Contact Information
+1 (201) 893-8155 +972-52-522-1170
top related