Title title title title title title title title title title title title title title
Transcription
Title title title title title title title title title title title title title title
SECURITY ANALYTICS & OPERATIONS CENTRE SERVICES "KMD'S 'SECURITY-AS-A-SERVICE' MODEL IS TYPICALLY ~40% CHEAPER THAN A SIMILAR ONPREMISE SOLUTION – WITH FAST IMPLEMENTATION AND NO NEED FOR RETAINING OR ATTRACTING HIGHLY SKILLED SECURITY RESOURCES INTERNALLY" THE SECURITY THREAT SHOULD BE TAKEN SERIOUSLY CYBER ATTACKS HAVE INCREASED… IN NUMBER OF ATTACKS: 23% Number of data breaches increased globally by 23 percent from 2013-2014 250% More than 65,000 attacks on Danish IT installations occurred in 2014 – an increase of 250% from the year before IN TIME SPENT INSIDE: Months No longer a 'drive-by-shooting', but a sophisticated, long-term breach – CSC hacked for 5 months KMD BPO SAC/SOC …AND CAN HAVE SERIOUS CONSEQUENCES INTERNAL: STOLEN AND BROKEN SYSTEMS _Destroyed IT systems and data _Invalid data OPERATIONS _Disrupted working time _Inability to produce products CUSTOMERS/SUPPLIERS _Lost sales _Lost sensitive data _Lost trust RIGHTS _Theft of IP rights and confidential documents EXTERNAL: EU DATA REGULATION - IN IMPLEMENTATION, 2016-2018 FACTS: _Breach notification within 24 hours after breach has been detected – both to public authorities and affected entities/customers _Customers have a right to get data erased (not only forgotten) _Entities >250 employees or with significant monetary transactions are subject to regulation IMPACT: _Fines up to EUR 100 million or 2% of global revenue for personnel sensitive data leakage can apply when regulation becomes effective 2 DO YOU HAVE WELL-BALANCED PROTECTION IN ALL SECURITY AREAS? KMD BPO SAC/SOC REACTIONS TO THREATS PREVENTIVE MEASURES Policies & guidance Risk analysis & compliance TYPE OF INITIATIVE ADMINISTRATIVE MEASURES AND PROCEDURES PHYSICAL AND TECHNICAL MEASURES CORRECTIVE MEASURES Log policies Supplier agreement Service/support agreements Change management Contingency planning and politics System documentation Awareness Disaster Recovery Procedures Penetration tests Security Analytics & forensics Backup/Restore Firewall Standby Antivirus Logging equipment & site Test environments Authentication Identity management SIEM Redundance Virtualisation Monitoring Intrusion prevention Clusters Server snapshot Intrusion detection 3 KMD'S PRODUCT PLATFORM ENABLES A RELEVANT MATCH TO VARIOUS SECURITY MATURITY LEVELS FROM BLISSFUL IGNORANCE.. … TO RECOGNITION … TO ALERTNESS KMD BPO SAC/SOC ... TO BEST PRACTISE RISK KMD SOLUTIONS LEVEL OF SECURITY ALERT AND ATTACK PREVENTION COMPLIANCE AND AWARENESS SECURITY CONTROL (Passive) _Firewalls and antivirus _Log management _Risk analysis SECURITY MONITORING (Automated) PROACTIVE SECURITY INTELLIGENCE SECURITY EXCELLENCE (Proactive) _SIEM (Security Information & Event Management) _Security Analytics Centre -24/7/365 surveillance _IDMaaS (Easy Access and Efficiency) _Full security outsourcing _Business continuity planning _IDMaaS (Security) _Compliance _Employee training (Awareness) _Master data (APOS*) _IDMaaS (Insight) * Authoritative Personnel & Organisational System 4 KMD'S SECURITY ANALYTICS AND OPERATIONS CENTRE SAFEGUARDS YOUR BUSINESS AGAINST UNWARRANTED BEHAVIOUR DID YOU KNOW … … that more than 65,000 attacks on Danish IT installations occurred in 2014 – an increase of 250% from the year before?* … that the average costs for a large organisation in the UK was DKK 10-30 million in 2015 for a single breach?** … that companies can be issued a fine equivalent to 2% of the company's global revenue for data leakage when the new EU data regulation becomes effective? KMD KMDBPO BPO SAC/SOC KMD SECURITY ANALYTICS AND OPERATIONS CENTRE KMD SUPPORT We offer a full portfolio of security products from basic log management and alerts to state-of-the-art security and forensics with 24/7 surveillance and proactive breach mitigation by highly skilled security analysts More than 200 private and public security customers … that most cyber attacks are triggered by ordinary mistakes made by the company's own or their IT supplier's employees? Data in Denmark – handled and protected by +100 Danish security specialists KMD collects and analyses 20 million logs (events) – every day 24/7 surveillance of threats against customer's infrastructure and proactive mitigation before it happens Ample security certificates – such as ISO 27001 … that retaining or attracting competent security employees who can keep up with the change in technology and threats requires continuous, high investments? * DKCERT Trendrapport 2015 ** PWC, Information Security Breaches Survey, 2015 5 KMD'S SECURITY OFFERING PROTECTS YOUR DATA – EVERYTHING FROM THOUGHTLESSNESS TO SOPHISTICATED ATTACKERS CYBER ATTACKS ARE NO LONGER "DRIVE-BY-SHOOTINGS", BUT SOPHISTICATED, LONG-TERM BREACHES THAT CAN COST YOU YOUR BUSINESS PREPARATION INTRUSION LONG-TERM BREACH Time spent by attacker: Time spent by attacker: Time spent by attacker: Days Seconds Months _Attacker gathers information and weak spots on target and creates weapon _Attacker delivers and exploits vulnerability _Attacker creates a command and control channel to continue remote operation _The attacker performs the steps to achieve his actual goals inside the victim's network (e.g. 229 days at CSC) KMD BPO SAC/SOC IMPACTING BOTTOMLINE THROUGH LOSS OF _IP rights _Working time _Broken IT systems and data _Personal data (and associated fines) _Revenue and share price (e.g. the company Target's revenues fell 46%) _Your customers' trust and your reputation KMD'S SECURITY SOLUTION PROTECTS YOU AGAINST SOPHISTICATED ATTACKS REDUCTION IN RISK OF CYBER ATTACKS REDUCTION IN INTRUDER TIME AND DAMAGE There is no such thing as a 100% guarantee against being hit by cyber attacks. However, with KMD, you get both reactive and proactive protection and mitigation, which reduces the risk of intrusion and significantly increases the ability to spot an intrusion quickly or even while it happens – thus limiting the consequences IMPROVED INTERNAL BEHAVIOUR Tailor-made reports allow you to understand and regulate risky employee behaviour REGULATORY COMPLIANCE ENSURED KMD's certification ensures your compliance with different industry specifications 6 KMD IS A UNIQUE SECURITY PLAYER PROTECTING DENMARK MADE TO PROTECT YOUR SENSITIVE DATA WHY KMD? _Denmark's largest security competence centre with more than 40 years' experience handling sensitive data _KMD protects Denmark by managing 20% of Denmark's GDP _KMD collects and analyses 20 million logs (events) every day SECURITY MATCHING YOUR NEEDS AT YOUR SERVICE AS-ASERVICE (aaS) BEST-IN-CLASS INSIGHTS _Experience with heterogeneous networks and integration of all types of applications, making us quick at implementation and able to match all different needs and systems _~40% cheaper aaS model than on premise _Most advanced Security Analytics Centre (SAC) in Denmark _Strong partnerships with competent global security and IT players _More than 200 customers from the private and public sector FACTS KMD gives you the security competence to keep your business safe KMD BPO SAC/SOC KMD has the experience in security and IT to tailor a solution to your exact needs _No CAPEX needed – access to high-tech infrastructure in KMD's secure data centre _Fast implementation and continuous upgrades controlled by and from KMD _ISO 27001-certified asa-Service security solution _No need for internal highly skilled security resources KMD has own infrastructure and bestin-class security specialists to reduce your costs at the best quality _+100 security experts who proactively service and advise private and public customers today – as well as KMD's own data _Member of the CERT (Computer Emergency Response Team)* highly specialised worldwide security network KMD proactively keeps you one step ahead of upcoming threats and new regulations 7 WHAT KMD OFFERS IS DEPENDENT ON YOUR NEEDS KMD BPO SAC/SOC DEPLOYMENT MODEL AND SERVICE LEVELS REACTIVE (SOC) PROACTIVE (SAC) SAC (SECURITY ANALYTICS CENTRE) LOG MANAGEMENT Fast overview of events ~1 week implementation time SIEM (SECURITY INFORMATION & EVENT MANAGEMENT) 24/7 surveillance and proactive mitigation Instant alert when breach occurs based on pre-defined rules ~2 weeks implementation time Less than 3 months implementation time BENEFITS _Prevent future threats and unwarranted behaviour by understanding activities _Save time on audits and compliance _Insights through monthly reports on security incidents _Reduction in impact of attacks by knowing your threat within a few hours instead of several days _Full outsourcing proactively warning you against possible attacks – before and when they happen _Focus on areas where threat is highest KMD PROMISES NO INTERRUPTION OF YOUR BUSINESS (E.G. NO SLOWER SYSTEM) EMPLOYEE INVOLVEMENT IN IMPLEMENTATION IS LIMITED TO ANSWERING QUESTIONS AND PROVIDING INFRASTRUCTURE AND DATA ACCESS YOU DECIDE THE SECURITY LEVEL WHICH FITS YOUR BUSINESS' NEED NO SURPRISES – THE PRICE IS PAID "AS-A-SERVICE" PER USER LICENCE/IP DEVICE CUSTOMER SECURITY COVERAGE CUSTOMER RESOURCES ALLOCATED TO SECURITY 8 KMD IS READY TO GUIDE YOU ON SECURITY KMD BPO SAC/SOC NEXT STEPS SEE FOR YOURSELF Come visit our high-tech Security Analytics Centre where KMD experts surveil data for our customers 24/7/365 CYBER ATTACKS ARE HERE TO STAY! _Increase in attacks and significance _Often start with a trivial human error or a lack of due care DEMONSTRATION OF ATTACK Our experts can give you a demonstration of a possible scenario and how it is mitigated and controlled with our security solutions RISK ASSESSMENT Let us make an assessment of your internal and external security risks to allow you to make a well-informed decision regarding your needs 9 KMD BPO FOR MORE INFORMATION, PLEASE CONTACT Peter Kjær [email protected] Phone: +4541398599