Computer Security Technology Ltd

+44 (0)20 7621 7836 LinkedInTwitter

+44 (0)20 7621 7836 CSTL LinkedInCSTL Twitter

September 18, 2014

Cyber Security WebEx - the seminar condensed into 1 hour

CST is organising a follow-up WebEx session to the cyber security event we held earlier this month with 3 hours of content condensed into just 60 minutes. So if you're sorry you missed the main event, sign up for our WebEx below.

Earlier this month we organised a seminar in central London to address Cyber security, it was well attended and we received some excellent feedback.

As a result we are arranging a
WebEx on the 4th NOVEMBER at 11.00AM
, the hour long session will summarise the three hours of rich speaker content - or at least, we will attempt to pack as much in this hour as practically possible!

*** To register for the webex email, please email info@cstl.com ***


Although primarily aimed for those that wanted to attend, but could not actually make the day, the WebEx is open to all. The topics include a summary of each of three speakers addressing:

•

Cyber law - impending changes to data security laws across Europe, the increase in fines, breach disclosure and the change in responsibilities of businesses affecting data controllers and data processors.

•

Governments Cyber essential scheme - why are Government urging UK’s Business to address Cyber risk, the requirements of the scheme and the 5 principal must do’s.

• CYBER THREAT LANDSCAPE - why have Lloyds moved Cyber risk from 13th to 3rd place as a threat to commerce, what are the emerging threats and risk to business. Examples of Cyber frauds and attacks that have resulted in financial losses.

Summary of Key facts of the event and what will be covered on the WebEx:

•

Cyber security is a real and tangible threat to UK commerce due to three converging issues:

~

Rapid growth & reliance on IT systems presenting something of value to the criminal, they can act remotely with low a risk of arrest. A US report cited Cyber-crime being worth more than the illegal Drugs trade

~

The proliferation and abundance of exploitable conditions and hacking tools have lowered the entry bar to non IT literate criminals, and conversely provided advanced techniques to avoid detection for the skilled hacker.

~

Interconnected world, the extension of IT systems beyond the traditional office walls has increased the complexity of managing security.

•

Cyber Security is a sub section of the larger Information Security (IS) function and should be treated as high priority with specific safeguards and importance.

•

Changes to EU Data laws - increase in fines up to 5% of global revenue and Businesses having to publicise the breach and formally inform customers.

•

Government have launched Cyber essentials campaign to a) raise awareness of Cyber threats to business and b) measure suppliers on their Cyber Security defence recommending five “Must Do” suggestions for Cyber Security such as:

1) Patching

2) Gateway security

3) Secure Configuration Control

4) Malware protection

5) User Access Control management


Services to help Customer measure there Cyber risk and make decisions on what to do first and how:

•

Cyber V (visibility) assessment - What policies exist to address managing cyber security, incident response, and long term resilience?

•

Information Risk Audit - What practices are in place to control confidential information disclosure?

•

Technical Controls Assessment - What controls are in place to detect and prevent a system breach?

• APT (Advanced Persistent Threat) Service - Is the organisation the target of a current APT style attack?

*** To register for the webex email, please email info@cstl.com ***