Download - Cytegic presentation 02 12
![Page 1: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/1.jpg)
www.cytegic.com
Company ConfidentialThis presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice.
Cytegic Cyber Security Management Solution
15-12-02
![Page 2: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/2.jpg)
| Proprietary & Confidential
Agenda
2
1. Introduction2. Your Needs3. Cytegic Solution4. Next Steps
![Page 3: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/3.jpg)
| Proprietary & Confidential
Why Cybersecurity Management Solutions?
3
“JPMorgan Chase will have spent more than $250 million annually on cybersecurity by the end of 2014, with approximately 1,000 people focused on the initiative. This effort will continue to grow exponentially over the years" Jamie Dimon
76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. -PWC
87% of US chief executives said they were worried that cyber threats could impact growth prospects, up from 69% the year before.- PWC
Cybersecurity management requires day-to-day operational commitment to transform from reactive to pro-active!
![Page 4: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/4.jpg)
| Proprietary & Confidential
Business Focus
4
Cytegic is a must have - the flood of threat intelligence and defensive information can no longer be analysed manually
Cytegic provides multiple facets of an end-to-end - cyber risk and security management solution
Common language for cyber risk and security professionals – both operationally and strategically Monitor threats and maturity of defences
Measure adherence to compliance standards both internal and external on a day to day basis
Manage and fully optimize cybersecurity posture
![Page 5: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/5.jpg)
| Proprietary & Confidential
Cytegic Integrated Solution
5
Dynamic Trend
Analysis
Cyber Maturity
Assessment
Cyber Decision
Support System
![Page 6: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/6.jpg)
www.cytegic.com
Cyber Risk Management Facet
6
Evaluate ExposureDetermine Risk Appetite
![Page 7: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/7.jpg)
| Proprietary & Confidential
Risk – Executive Screen
EnterpriseRisk
Environment Risks
QuantifiedImpact
HistoricalRisk
Business Asset
Risk Trend
Risk Score Actual
Risk Threshold
Impact Amount $
![Page 8: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/8.jpg)
| Proprietary & Confidential
Risk – CRO Screen
• Build own thresholds
• Good practice risk sources
Confidentiality Integrity Availability
![Page 9: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/9.jpg)
www.cytegic.com
Cyber Security Management Facet
9
Explore the Organization
![Page 10: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/10.jpg)
| Proprietary & Confidential
CISO Screen – Enterprise View
10
Enterprise Risk Index Enterprise Assets at Risk
Threats to the Enterprise Defensive Controls Importance
Environments Risk Index
![Page 11: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/11.jpg)
| Proprietary & Confidential
CISO Screen – Environment Controls
11
![Page 12: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/12.jpg)
| Proprietary & Confidential
Controls – Prioritized for Improvement
12
The Control Gauge
Color Bar = Relative Importance
Grey Bar = Maturity Score %
Infrastructure Controls
Preventative Controls
Detective Controls
![Page 13: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/13.jpg)
| Proprietary & Confidential
CyMA Environment Control Maturities
13
Control Maturities
• Environment View• Drill down to Criteria• Input to Threat
Analysis in CDSS• Contextual• Simulations
![Page 14: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/14.jpg)
| Proprietary & Confidential
CyMA Control Maturities
14
Detailed Control Analysis
• Automated collection of control configuration facts
• Drill down to criteria• Sort and Rank• Eliminate from analysis if
not implemented
![Page 15: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/15.jpg)
www.cytegic.com
Threat Intelligence Facet
15
Geo-Political SpecificityIndustry Sector Specificity
![Page 16: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/16.jpg)
| Proprietary & Confidential 16
Remote Terminal Server
CISO Screen - Threats
What Threat Agents are we facing?
What Attack Methods are we susceptible to?
Systems
Software
Facilities
![Page 17: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/17.jpg)
| Proprietary & Confidential
Trends in the Threats Landscape
17
The Threat Agents
The Attack Methods
![Page 18: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/18.jpg)
| Proprietary & Confidential
DyTA Relevant Threat Levels
18
Threat Agents
Relevant Attack Methods
![Page 19: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/19.jpg)
| Proprietary & Confidential
DyTA Threat Charts
Attackers Activity over time with filters for:
• Use of Attack Methods• Targeted Assets• Geo Region Targets• Industry Segment Activity
![Page 20: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/20.jpg)
www.cytegic.com
Environments & Business Assets Facet
20
How will these threats and securityposture affect my organization?
![Page 21: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/21.jpg)
| Proprietary & Confidential
CDSS - Business Risk
21
![Page 22: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/22.jpg)
| Proprietary & Confidential
Overall Risk Scores
22
Environment Threat Level Asset Threat Level
Increased Attacker Activity will increase over all Threat Levels Increased Control Maturities will decrease over all Threat Levels
![Page 23: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/23.jpg)
| Proprietary & Confidential
CDSS User Interface – Analysis & Simulations
23
25.00 - Low 25.00 - Low
![Page 24: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/24.jpg)
| Proprietary & Confidential
Risk – CRO Screen – Mission Accomplished
EnterpriseRisk
Environment Risks
QuantifiedImpact
HistoricalRisk
Business Asset
Risk Trend
Risk Score Actual
Risk Threshold
Impact Amount $Acceptable
Risk Levels
![Page 25: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/25.jpg)
| Proprietary & Confidential
Cytegic an End-to-End Solution A must have for ensuring the safety of your business assets
Operational and Actionable
Exposure and Compliance
Strategic Risk Appetite
CRO CISO C-Suite
![Page 26: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/26.jpg)
| Proprietary & Confidential
Case Study – CDSS
26
The CISO of a large bank wished to perform cybersecurity assessments regarding the impact of migrating the CRM to the Cloud.Key requirements were:
• Independent assessment capability
• Quick implementation (a technical assessment of new technology was due)
• Ability to conduct dynamic assessments using up to date intelligence. Results:
Decision to utilize cloud technology
Improve buy- in with the management; justify IT security spending using
real data
Conduct frequent assessments without
having to rely on extremal auditors and / or additional
budget
Produced unbiased results
![Page 27: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/27.jpg)
| Proprietary & Confidential
Thank you
27
![Page 28: Cytegic presentation 02 12](https://reader036.vdocumento.com/reader036/viewer/2022062401/58f158d81a28ab421d8b45d7/html5/thumbnails/28.jpg)
US Office:Suite #200411 Hackensack Ave. Hackensack, NJ 07601USA
Israel Office:Suite #60139 Sha’ul HaMelech Blvd Tel-Aviv, 64928Israel
Contact Information
+1 (201) 893-8155 +972-52-522-1170