enabling personal internet security

6
© LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

Upload: tao

Post on 11-Jan-2016

28 views

Category:

Documents


0 download

DESCRIPTION

Enabling Personal Internet Security. Dave Martin Managing Security Consultant. Agenda. 30 Second Introduction Current and Emerging Cyberspace Threats Addressing the Threats – Three Pronged Approach. 30 Second Introduction. LogicaCMG Worldwide business support company - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Enabling Personal Internet Security

© LogicaCMG 2006. All rights reserved

Enabling Personal Internet Security

Dave Martin

Managing Security Consultant

Page 2: Enabling Personal Internet Security

2Privacy in Cyberspace

Agenda

30 SecondIntroduction

Current and Emerging Cyberspace Threats

Addressing the Threats – Three Pronged Approach

Page 3: Enabling Personal Internet Security

3Privacy in Cyberspace

30 Second Introduction

• LogicaCMG

– Worldwide business support company

– 40,000 employees worldwide

– 250+ full time security consultants

– Full boardroom to bytes security service

Page 4: Enabling Personal Internet Security

4Privacy in Cyberspace

Current and Emerging Cyberspace Threats

• Consumers are exposed to fraud potential

• Viruses, Worms, Trojans, Letter Bombs and more…

• Unacceptable behaviour on-line

• Phishing already a significant problems for consumers

• Penetration of wireless networks

• E-mail interception

• Spear-phishing

Page 5: Enabling Personal Internet Security

5Privacy in Cyberspace

Education

Government websitesISP campaignsVendor adviceIndustry advice

Tools

Anti-virus & Anti-SpamFirewalls

Patch levelsSecured wireless routers

Global co-operation

Cross border co-operation

Education

Targeted advice to publicTailored advice to public

Tools

Secure e-mailIE7

Behavioural Analytics

Global co-operation

MoU between countries

Addressing the Threats – Three Pronged Approach

Page 6: Enabling Personal Internet Security

6Privacy in Cyberspace

Summary

• Government to sponsor public awareness

• ISPs to provide customers with toolkit

• Businesses to safeguard their customers’ information

• Consumers to use the tools available

Coherent - Cost-effective - Simple