Cytegic presentation 02 12

28
www.cytegic.com Company Confidential This presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice. Cytegic Cyber Security Management Solution 15-12-02

Transcript of Cytegic presentation 02 12

Page 1: Cytegic presentation 02 12

www.cytegic.com

Company ConfidentialThis presentation and the information herein, are the exclusive properties of Cytegic Ltd., and shall not be disclosed, in whole or in part, to any third party or utilized for any purpose other than the express purpose for which it has been provided. Viewers of this presentation are not permitted to copy, distribute, retransmit or modify any of the information in this presentation, whether in electronic or hard copy form, without the express prior written permission of Cytegic Ltd. The company may update, amend, supplement or otherwise alter the information without prior notice.

Cytegic Cyber Security Management Solution

15-12-02

Page 2: Cytegic presentation 02 12

| Proprietary & Confidential

Agenda

2

1. Introduction2. Your Needs3. Cytegic Solution4. Next Steps

Page 3: Cytegic presentation 02 12

| Proprietary & Confidential

Why Cybersecurity Management Solutions?

3

“JPMorgan Chase will have spent more than $250 million annually on cybersecurity by the end of 2014, with approximately 1,000 people focused on the initiative. This effort will continue to grow exponentially over the years" Jamie Dimon

76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. -PWC

87% of US chief executives said they were worried that cyber threats could impact growth prospects, up from 69% the year before.- PWC

Cybersecurity management requires day-to-day operational commitment to transform from reactive to pro-active!

Page 4: Cytegic presentation 02 12

| Proprietary & Confidential

Business Focus

4

Cytegic is a must have - the flood of threat intelligence and defensive information can no longer be analysed manually

Cytegic provides multiple facets of an end-to-end - cyber risk and security management solution

Common language for cyber risk and security professionals – both operationally and strategically Monitor threats and maturity of defences

Measure adherence to compliance standards both internal and external on a day to day basis

Manage and fully optimize cybersecurity posture

Page 5: Cytegic presentation 02 12

| Proprietary & Confidential

Cytegic Integrated Solution

5

Dynamic Trend

Analysis

Cyber Maturity

Assessment

Cyber Decision

Support System

Page 6: Cytegic presentation 02 12

www.cytegic.com

Cyber Risk Management Facet

6

Evaluate ExposureDetermine Risk Appetite

Page 7: Cytegic presentation 02 12

| Proprietary & Confidential

Risk – Executive Screen

EnterpriseRisk

Environment Risks

QuantifiedImpact

HistoricalRisk

Business Asset

Risk Trend

Risk Score Actual

Risk Threshold

Impact Amount $

Page 8: Cytegic presentation 02 12

| Proprietary & Confidential

Risk – CRO Screen

• Build own thresholds

• Good practice risk sources

Confidentiality Integrity Availability

Page 9: Cytegic presentation 02 12

www.cytegic.com

Cyber Security Management Facet

9

Explore the Organization

Page 10: Cytegic presentation 02 12

| Proprietary & Confidential

CISO Screen – Enterprise View

10

Enterprise Risk Index Enterprise Assets at Risk

Threats to the Enterprise Defensive Controls Importance

Environments Risk Index

Page 11: Cytegic presentation 02 12

| Proprietary & Confidential

CISO Screen – Environment Controls

11

Page 12: Cytegic presentation 02 12

| Proprietary & Confidential

Controls – Prioritized for Improvement

12

The Control Gauge

Color Bar = Relative Importance

Grey Bar = Maturity Score %

Infrastructure Controls

Preventative Controls

Detective Controls

Page 13: Cytegic presentation 02 12

| Proprietary & Confidential

CyMA Environment Control Maturities

13

Control Maturities

• Environment View• Drill down to Criteria• Input to Threat

Analysis in CDSS• Contextual• Simulations

Page 14: Cytegic presentation 02 12

| Proprietary & Confidential

CyMA Control Maturities

14

Detailed Control Analysis

• Automated collection of control configuration facts

• Drill down to criteria• Sort and Rank• Eliminate from analysis if

not implemented

Page 15: Cytegic presentation 02 12

www.cytegic.com

Threat Intelligence Facet

15

Geo-Political SpecificityIndustry Sector Specificity

Page 16: Cytegic presentation 02 12

| Proprietary & Confidential 16

Remote Terminal Server

CISO Screen - Threats

What Threat Agents are we facing?

What Attack Methods are we susceptible to?

Systems

Software

Facilities

Page 17: Cytegic presentation 02 12

| Proprietary & Confidential

Trends in the Threats Landscape

17

The Threat Agents

The Attack Methods

Page 18: Cytegic presentation 02 12

| Proprietary & Confidential

DyTA Relevant Threat Levels

18

Threat Agents

Relevant Attack Methods

Page 19: Cytegic presentation 02 12

| Proprietary & Confidential

DyTA Threat Charts

Attackers Activity over time with filters for:

• Use of Attack Methods• Targeted Assets• Geo Region Targets• Industry Segment Activity

Page 20: Cytegic presentation 02 12

www.cytegic.com

Environments & Business Assets Facet

20

How will these threats and securityposture affect my organization?

Page 21: Cytegic presentation 02 12

| Proprietary & Confidential

CDSS - Business Risk

21

Page 22: Cytegic presentation 02 12

| Proprietary & Confidential

Overall Risk Scores

22

Environment Threat Level Asset Threat Level

Increased Attacker Activity will increase over all Threat Levels Increased Control Maturities will decrease over all Threat Levels

Page 23: Cytegic presentation 02 12

| Proprietary & Confidential

CDSS User Interface – Analysis & Simulations

23

25.00 - Low 25.00 - Low

Page 24: Cytegic presentation 02 12

| Proprietary & Confidential

Risk – CRO Screen – Mission Accomplished

EnterpriseRisk

Environment Risks

QuantifiedImpact

HistoricalRisk

Business Asset

Risk Trend

Risk Score Actual

Risk Threshold

Impact Amount $Acceptable

Risk Levels

Page 25: Cytegic presentation 02 12

| Proprietary & Confidential

Cytegic an End-to-End Solution A must have for ensuring the safety of your business assets

Operational and Actionable

Exposure and Compliance

Strategic Risk Appetite

CRO CISO C-Suite

Page 26: Cytegic presentation 02 12

| Proprietary & Confidential

Case Study – CDSS

26

The CISO of a large bank wished to perform cybersecurity assessments regarding the impact of migrating the CRM to the Cloud.Key requirements were:

• Independent assessment capability

• Quick implementation (a technical assessment of new technology was due)

• Ability to conduct dynamic assessments using up to date intelligence. Results:

Decision to utilize cloud technology

Improve buy- in with the management; justify IT security spending using

real data

Conduct frequent assessments without

having to rely on extremal auditors and / or additional

budget

Produced unbiased results

Page 27: Cytegic presentation 02 12

| Proprietary & Confidential

Thank you

27

Page 28: Cytegic presentation 02 12

[email protected]

US Office:Suite #200411 Hackensack Ave. Hackensack, NJ 07601USA

Israel Office:Suite #60139 Sha’ul HaMelech Blvd Tel-Aviv, 64928Israel

Contact Information

+1 (201) 893-8155 +972-52-522-1170