CYBER SECURITY Audit, Test & Compliance



Similar documents
THALES. corn

The Human Component of Cyber Security

Good Cyber is Good Business

Cyber Security - What Would a Breach Really Mean for your Business?

developing your potential Cyber Security Training

CYBER SECURITY TRAINING SAFE AND SECURE

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

External Supplier Control Requirements

IT Services. We re the IT in OrganIsaTion. Large Organisations

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice

THE HUMAN COMPONENT OF CYBER SECURITY

BT Assure Threat Intelligence

Cyber security Building confidence in your digital future

MSc Cyber Security. identity. hacker. virus. network. information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cybersecurity: Mission integration to protect your assets

Managing business risk

Disaster Recovery for Business-Critical Applications. Your business. Back in business. Real-time DR solutions you can rely upon when all else fails

Accessing and sending data securely across security domains

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Our Cloud Offers You a Brighter Future

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Address C-level Cybersecurity issues to enable and secure Digital transformation

NNIT Cybersecurity. A new threat landscape requires a new approach

CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cybersecurity on a Global Scale

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

Cyber Security solutions

A GOOD PRACTICE GUIDE FOR EMPLOYERS

DOBUS And SBL Cloud Services Brochure

Nine Steps to Smart Security for Small Businesses

A Guide to the Cyber Essentials Scheme

Cyber Security for SCADA/ICS Networks

White Paper. Information Security -- Network Assessment

A Decision Maker s Guide to Securing an IT Infrastructure

IBM Security Intrusion Prevention Solutions

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: Fax:

Information security controls. Briefing for clients on Experian information security controls

Information Security Services

Cisco Advanced Services for Network Security

Bio-inspired cyber security for your enterprise

Business Case for a DDoS Consolidated Solution

In partnership with. Food & Drink A fresh approach to risk management

Technology management in warship acquisition

Managed Network Services

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

A practical guide to IT security

The Cyber Threat Profiler

BT Contact Centre Efficiency Quick Start Service

Master of Science in Cyber Security and Management

<cloud> Secure Hosting Services

Cyber Risks and Insurance Solutions Malaysia, November 2013

How To Manage Risk On A Scada System

How To Create An Insight Analysis For Cyber Security

Your complete guide to Cloud Computing

Small businesses: What you need to know about cyber security

CyberArk Privileged Threat Analytics. Solution Brief

How To Protect Your Business From A Cyber Attack

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Guardian365. Managed IT Support Services Suite

National Cyber Security Policy -2013

RUAG Cyber Security. More security for your data

Cyber Security for audit committees

Unit 3 Cyber security

Transforming public services in Scotland Value Added Services

Can PCI DSS Compliance Be Achieved in a Cloud Environment?

A COMPLETE APPROACH TO SECURITY

CYBER SECURITY, A GROWING CIO PRIORITY

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Risk mitigation for business resilience White paper. A comprehensive, best-practices approach to business resilience and risk mitigation.

Beyond the Hype: Advanced Persistent Threats

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

A HELPING HAND TO PROTECT YOUR REPUTATION

CyberSecurity Solutions. Delivering

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Transcription:

www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance

02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit 08 Good Cyber is Good Business 09 Cyber Integration and Innovation Centre 10 Your Next Steps... 11 Why Thales? 11 The cyber threat is real: There is a growing risk of disruption, information loss, reputation damage and material cost to your organisation. The UK Government believes cyber crime is costing the UK economy 27billion per year, including a 21bn cost to its businesses. Each year this number increases as perpetrators use ever more sophisticated techniques to attack us. The constantly evolving threat environment is such that you can soon fall behind the curve and are no longer secure. Cyber security is not a product, it is a journey. With over forty years of experience in Information Assurance and Security, Thales has an unrivalled understanding of the range of threats that our commercial, government, and military customers face. Only you can determine which route you take. We are here to help you. Can Good Cyber be Good Business? The UK Government believes 44 million cyber attacks were made on UK organisations in 2011 with 27 billion pounds worth of damage to the economy

03 The Threat The cyber threat is real. It is sophisticated. It is pervasive. Global in reach and capable of complex attacks on an industrial scale, cyber crime is everybody s problem now. Time is not on our side. In 2011, UK organisations suffered some 44 million cyber attacks. The UK Government estimated the damage to the UK economy to be 27bn. 98% of these breaches involved external agents. The cyber threat is here today, and the inadequate cyber defence posture of UK Plc is costing its companies dearly. 93% of large businesses and 87% of SMEs across all sectors experienced a cyber security breach. The cost of such an attack could be catastrophic to the profitability, or even the viability, of a company. In response, the UK Government has designated cyber crime and espionage as a Tier One national security threat. We recognise that for organisations concerned by the implications of cyber risks and compliance, affordable cyber protection is essential. Yet as the cyber threat rapidly evolves, it is difficult for organisations to assess where they are vulnerable and how to protect themselves. We also understand that cyber security is a concept almost entirely new to many organisations as they become increasingly reliant on the Internet to conduct their business activities. Thales is here to help you. About Thales World-class technologies and the combined expertise of 65,000 employees in 56 locally based country operations make Thales a key player in assuring the security of citizens, infrastructure, and nations. Thales is a leading supplier of security technologies to secure your people, places and information. For more than 40 years, Thales has delivered state of the art physical and cyber security solutions to commercial, critical national infrastructure, government and military customers. In all, Thales delivers cyber security projects across 50 countries, with a global network of small business and research partners that provides it with deep expertise and the agility to deliver industry-leading solutions. It has more than 200 cyber and security specialists with domain expertise across the complete cyber spectrum. Thales believes Good Cyber is Good Business. Thales will help you refocus your security spend to defend your organisation and prevent significant loss of revenue and reputation. Thales will ensure your competitive advantage is maintained by being able to demonstrate resilient and secure use of cyberspace.

04 Our Approach Cyber security is more than a firewall or password. It is not a product. It is a journey and the attitude we take towards it. At the heart of what Thales does is the belief that Good Cyber is Good Business. A positive approach to cyber security can reduce the operational impact of cyber security policies and processes on your organisation, mitigate the risk of disruption and revenue loss from cyber attacks, secure your intellectual property, protect and enhance your reputation, and potentially release cash from any contingent reserve or insurance policy. At the same time, we recognise that each customer is at a different stage of maturity in understanding and managing their cyber security risk. To reflect this, we offer a bespoke, responsive, and layered service approach, through a single point of contact, to deal immediately with your unique cyber security concerns. We also understand that for organisations concerned by the implications of cyber risks and compliance, affordable cyber protection is essential. Yet as the cyber threat rapidly evolves it is difficult for organisations to assess whether they are vulnerable and what they should do to protect themselves. Our modular, consultancy-led offering will enable you to have access to a comprehensive cyber assurance service, while only paying for the components that are pertinent to your business. We offer a range of services, from low cost vulnerability assessments, through comprehensive audits, to technology testing and integration, monitoring and response services, and regulatory compliance support. Every organisation is unique. Every requirement is unique. But here s how yours might look: 1 Vulnerability Assessment 2 P enetration Test 3 H olistic Audit Whatever your understanding of the cyber threat, we are here to help you along the journey to a cyber protected posture. Your journey starts here. 94% of large businesses 87% of SMEs experienced a cyber security breach last year in the UK

05 Cyber Consulting Thales has a dedicated cyber security consultancy team based in the UK ready to support your organisation. As accredited practitioners, they are able to assess your business needs and determine the most effective way of securing your information and reducing the risks affecting your organisation. For the past 40 years, Thales has provided world beating end-to-end information security solutions to government, military, Critical National Infrastructure, and commercial organisations. Whether you are an SME or multinational, Thales has the capability and expertise to help your organisation, whatever its specific needs. Our cyber security consultants can provide services in the following areas: People Cyber security is not just about firewalls and passwords. It includes people too. Security training, policies, and processes are vital to ensuring your technology solutions are enabled to work to their full potential. Thales can help you deliver in all these areas. Processes Our wealth of experience in accreditation and evaluation processes allows us to assist you in achieving necessary accreditation for your security systems. Thales will help you to reduce disruption to your business, while maximising benefit from your relationships with government agencies. Technology Technology is what Thales does. We can provide up to the minute advice on the latest technologies whilst remaining vendor neutral. We can refer you to our state of the art Cyber Integration and Innovation Centre where we test the capability of many of the newest and most innovative solutions to tomorrow s cyber security threats. Thales has subject matter experts across a wide range of security domains, from risk assessment and mitigation, disaster recover and cryptography, to physical security, infrastructure security, and identity and access management. Whatever your needs, Thales is here to help you. The threat is sophisticated and pervasive. It is everybody s problem now

06 Vulnerability Assessment Our Vulnerability Assessment is an affordable yet critical starting point on your journey to cyber protection. Thales provides accredited cyber security consultants to work with your business to produce a report detailing your vulnerabilities with a range of recommendations to address these. It represents the ideal first step to helping you to understand the current status of your information security, empowering you to make informed business decisions. The journey begins here. What we will do for you Thales uses a three stage approach to deliver a comprehensive assessment: 1 Preliminary Assessment and Proposal An accredited Thales cyber security consultant will work with you to understand your business objectives and cyber security requirements, and tailor our service to these to deliver maximum benefit. 2 Vulnerability Assessment Your dedicated Thales consultant will perform a deep analysis of your information networks to determine the extent of your vulnerabilities. These will be categorised against a criteria of Criticality, Exploitability, Impact and Probability to establish underlying risk levels. 3 Assessment Report Your consultant will provide you with a detailed report that clearly states the vulnerabilities identified during the assessment, their potential impact on your business and will make a number of recommendations to address these. Data Loss IP Theft Business disruption Fraud Reputation damage Insurance cost Revenue loss

Penetration Testing Our Penetration Test represents the next step forward from a Vulnerability Assessment on your journey to cyber protection. As an extension of our Vulnerability Assessment, a Penetration Test will help you to understand fully how a cyber attack could exploit vulnerabilities in your organisation s networks. 07 Using synthetic environments, Thales is able to simulate the implications of real-life cyber attacks against your information networks, in situations where live testing of the target environment is not possible. It will provide you with a bespoke and illustrative proof of concept of not only your vulnerabilities, but how cyber threats against your organisation could be exploited. What we will do for you Thales uses a three stage approach to deliver a comprehensive assessment: 1 Preliminary Assessment and Proposal An accredited Thales cyber security consultant will work with you to understand your business objectives and cyber security requirements, and tailor our service to these to deliver maximum benefit. 2 Penetration Testing Your dedicated consultant will first perform a deep analysis of your information networks to determine the extent of your vulnerabilities. These will be categorised against a criteria of Criticality, Exploitability, Impact and Probability to establish underlying risk levels. As part of this, your consultant will seek to exploit the identified vulnerabilities as proof of concept of the potential impact they could have on the target system. We recognise that this is not always practical or possible with live systems. However, by using Thales state of the art synthetic environment in our Cyber Integration and Innovation Centre, we are able to offer a safe environment in which to replicate discovered issues and demonstrate their exploitability in a risk-controlled environment. 3 Assessment Report Your consultant will provide you with a detailed report that clearly states the vulnerabilities identified during the initial assessment, those which were found to be exploitable in the Penetration Test and the extent to which they could be exploited. 58% of European mid-sized firms say they would refuse to do business with a company that had suffered a data breach

08 Holistic Audit The most sophisticated cyber security can be defeated if an external agent can walk freely into the premises and pull out a plug. Our Holistic Audit service goes beyond the immediate cyber domain to deliver a 360 security assessment of your business, including human and environmental factors. It will provide you with a comprehensive report detailing vulnerabilities across your organisation as a complete entity and make wide ranging recommendations to address these. Security - Holistic Audits Our Holistic Audit will help you to understand fully the current status of your information security across the entirety of your business, empowering you to make informed business decisions. What we will do for you Thales uses a three stage approach to deliver a comprehensive assessment: 1 Preliminary Assessment and Proposal An accredited Thales security consultant will work with you to understand your business objectives and information assurance requirements, and tailor our service to these to deliver maximum benefit. 2 Holistic Audit Your Thales consultant will examine your business across the many factors, which determine your cyber security posture across physical, personnel and procedural domains, according to our HELP Doctrine: Human Environmental Logical Physical Only by identifying and considering the impact of vulnerabilities in all these areas can we complete a full assessment of your security posture. 3 Assessment Report Your consultant will provide you with a detailed report that clearly states the vulnerabilities identified across all physical and cyber domains during the assessment, their potential impact on your business and a number of recommendations to address these. Many cyber-aware organisations still see Cyber Security as a cost Thales has a different, more positive view

09 Good Cyber is Good Business Business benefits approach = empower business leaders to prioritise their benefits from cyber security opportunity to exploit a competitive advantage P&L rewards

10 The Thales Cyber Integration and Innovation Centre We are committed to providing our customers with the security evaluation capability to derisk the implementation of new and improving in-service systems, whilst ensuring they meet evolving security requirements. To meet the growing demand for this service, we have invested in the creation of a state of the art Cyber Integration Centre. What is it? The Cyber Centre provides a synthetic, virtual environment where theoretical and practical security architecture can be tested and developed through the use of replicated networks and cyber attacks. The synthetic environment uses a Packet Generation and Protocol Test suite, including pushing real malware and DDOS attacks on physical or virtual servers and devices to see how they perform under sustained attack and/or network loads. The use of VMware ESXi technologies, hardware appliances, the Spirent TestCenter, and Avalanche products allows multiple simultaneous domains to run concurrently regardless of the scale or simulated dispersion. The environment features separate VLANs with Cisco and VMware switches that enable us to run multiple concurrent scenarios in isolated, safe environments without impacting others. How does Thales benefit? As a leading cyber security provider, we use this platform to stay ahead of the curve, building and enhancing our capabilities and market offerings: Risk assessment, vulnerability testing, and security architectures are tried, tested and enhanced. We work with our partner companies to bring the very best of SME offerings to market. Collectively or individually we can test and train in all our disciplines. Only through such dedicated investment in our capability can we maintain our position as a world class cyber security company. How do you benefit? Our capability is our customers capability. You will benefit from the services of fully accredited cyber security specialists trained in the latest threats and security solution who can, in turn, provide consultancy, training, and assessment services to your organisation. The Cyber Centre allows us to train our practitioners and customers in how to secure their networks and assets. The facility provides an environment in which we can test, integrate, and demonstrate our cyber security services. This takes the risk out of implementation for your organisation. It also allows us to ensure you receive entirely bespoke solutions and meet evolving security requirements. cyber security posture business resilience protected IP secured customer data reputation contingent risk competitiveness

11 Your Next Steps... Research commissioned by the UK Government found that, in the UK last year, 93% of large businesses and 87% of small businesses experienced a cyber security breach. The average cost of the most serious security breaches for small organisations was 35,000 to 65,000 and for large organisations was between 450,000 and 850,000. The cost of such an attack could be catastrophic to the profitability, if not viability, of a company. Cyber crime is a business risk to your operations, reputation and finances. This is happening in a world in which data is the new IP, brand reputation is a Tweet away from nil, and trust in supply chains is paramount. Our experience has shown us that doing nothing is not an option. We are here to help you equip your organisation to meet the cyber threat at a cost and rigour appropriate to your organisation. The constantly evolving threat environment is such that you can soon fall behind the curve and are no longer secure. Cyber security is not a product. It is a journey. We are here to help you. Contact us now to start your journey. Good Cyber is Good Business Why Thales? As a world leader in providing modular, integrated cyber security solutions to meet your organisation s specific needs, we can: Design and implement upgrades to the security of your existing business with minimal impact to your business operations. Pull through capabilities from the global Thales Group and our industry partners to deliver secure solutions that deliver tangible business benefits. Use our world-leading encryption product suite to protect your data. Our encryption hardware helps to secure an estimated 80% of the world s payment transactions. Money in. Not money out. Good Cyber is Good Business

Contact us to find out how we can help you Thales UK Ltd, Manor Royal, Crawley, West Sussex RH10 9HA, UK Tel: +44 (0) 1256 376633 Email: cyber@uk.thalesgroup.com www.thalescyberassurance.com 2013 THALES UK LTD. This document and any data included are the property of Thales UK Ltd. No part of this document may be copied, reproduced, transmitted or utilised in any form or by any means without the prior written permission of Thales UK Limited having first been obtained. Thales has a policy of continuous development and improvement. Consequentially the services may vary from the description and specification in this document. This document may not be considered as a contract specification. Graphics do not indicate use or endorsement of the featured equipment or services. 3921/10/2013. Design and production by Space Worldwide. www.spaceworldwide.com