Cytegic presentation 02 12

Post on 15-Apr-2017

272 views 0 download

Transcript of Cytegic presentation 02 12

www.cytegic.com

Company ConfidentialThis presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice.

Cytegic Cyber Security Management Solution

15-12-02

| Proprietary & Confidential

Agenda

2

1. Introduction2. Your Needs3. Cytegic Solution4. Next Steps

| Proprietary & Confidential

Why Cybersecurity Management Solutions?

3

“JPMorgan Chase will have spent more than $250 million annually on cybersecurity by the end of 2014, with approximately 1,000 people focused on the initiative. This effort will continue to grow exponentially over the years" Jamie Dimon

76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. -PWC

87% of US chief executives said they were worried that cyber threats could impact growth prospects, up from 69% the year before.- PWC

Cybersecurity management requires day-to-day operational commitment to transform from reactive to pro-active!

| Proprietary & Confidential

Business Focus

4

Cytegic is a must have - the flood of threat intelligence and defensive information can no longer be analysed manually

Cytegic provides multiple facets of an end-to-end - cyber risk and security management solution

Common language for cyber risk and security professionals – both operationally and strategically Monitor threats and maturity of defences

Measure adherence to compliance standards both internal and external on a day to day basis

Manage and fully optimize cybersecurity posture

| Proprietary & Confidential

Cytegic Integrated Solution

5

Dynamic Trend

Analysis

Cyber Maturity

Assessment

Cyber Decision

Support System

www.cytegic.com

Cyber Risk Management Facet

6

Evaluate ExposureDetermine Risk Appetite

| Proprietary & Confidential

Risk – Executive Screen

EnterpriseRisk

Environment Risks

QuantifiedImpact

HistoricalRisk

Business Asset

Risk Trend

Risk Score Actual

Risk Threshold

Impact Amount $

| Proprietary & Confidential

Risk – CRO Screen

• Build own thresholds

• Good practice risk sources

Confidentiality Integrity Availability

www.cytegic.com

Cyber Security Management Facet

9

Explore the Organization

| Proprietary & Confidential

CISO Screen – Enterprise View

10

Enterprise Risk Index Enterprise Assets at Risk

Threats to the Enterprise Defensive Controls Importance

Environments Risk Index

| Proprietary & Confidential

CISO Screen – Environment Controls

11

| Proprietary & Confidential

Controls – Prioritized for Improvement

12

The Control Gauge

Color Bar = Relative Importance

Grey Bar = Maturity Score %

Infrastructure Controls

Preventative Controls

Detective Controls

| Proprietary & Confidential

CyMA Environment Control Maturities

13

Control Maturities

• Environment View• Drill down to Criteria• Input to Threat

Analysis in CDSS• Contextual• Simulations

| Proprietary & Confidential

CyMA Control Maturities

14

Detailed Control Analysis

• Automated collection of control configuration facts

• Drill down to criteria• Sort and Rank• Eliminate from analysis if

not implemented

www.cytegic.com

Threat Intelligence Facet

15

Geo-Political SpecificityIndustry Sector Specificity

| Proprietary & Confidential 16

Remote Terminal Server

CISO Screen - Threats

What Threat Agents are we facing?

What Attack Methods are we susceptible to?

Systems

Software

Facilities

| Proprietary & Confidential

Trends in the Threats Landscape

17

The Threat Agents

The Attack Methods

| Proprietary & Confidential

DyTA Relevant Threat Levels

18

Threat Agents

Relevant Attack Methods

| Proprietary & Confidential

DyTA Threat Charts

Attackers Activity over time with filters for:

• Use of Attack Methods• Targeted Assets• Geo Region Targets• Industry Segment Activity

www.cytegic.com

Environments & Business Assets Facet

20

How will these threats and securityposture affect my organization?

| Proprietary & Confidential

CDSS - Business Risk

21

| Proprietary & Confidential

Overall Risk Scores

22

Environment Threat Level Asset Threat Level

Increased Attacker Activity will increase over all Threat Levels Increased Control Maturities will decrease over all Threat Levels

| Proprietary & Confidential

CDSS User Interface – Analysis & Simulations

23

25.00 - Low 25.00 - Low

| Proprietary & Confidential

Risk – CRO Screen – Mission Accomplished

EnterpriseRisk

Environment Risks

QuantifiedImpact

HistoricalRisk

Business Asset

Risk Trend

Risk Score Actual

Risk Threshold

Impact Amount $Acceptable

Risk Levels

| Proprietary & Confidential

Cytegic an End-to-End Solution A must have for ensuring the safety of your business assets

Operational and Actionable

Exposure and Compliance

Strategic Risk Appetite

CRO CISO C-Suite

| Proprietary & Confidential

Case Study – CDSS

26

The CISO of a large bank wished to perform cybersecurity assessments regarding the impact of migrating the CRM to the Cloud.Key requirements were:

• Independent assessment capability

• Quick implementation (a technical assessment of new technology was due)

• Ability to conduct dynamic assessments using up to date intelligence. Results:

Decision to utilize cloud technology

Improve buy- in with the management; justify IT security spending using

real data

Conduct frequent assessments without

having to rely on extremal auditors and / or additional

budget

Produced unbiased results

| Proprietary & Confidential

Thank you

27

www.cytegic.cominfo@cytegic.com

US Office:Suite #200411 Hackensack Ave. Hackensack, NJ 07601USA

Israel Office:Suite #60139 Sha’ul HaMelech Blvd Tel-Aviv, 64928Israel

Contact Information

+1 (201) 893-8155 +972-52-522-1170