Post on 29-Mar-2022
transcript
www.happycloudsolutions.com.au 1
Cyber Security: Protection for SMEs
Markus Mueller
© Checkpoint Live Cyber Attack Threat Map
www.happycloudsolutions.com.au 3
Personal Background
1999
Graduate Engineer in Information Technology
Started Career in IT Security at Bechtle
2012
!
Worked with Clients like: - Mercedes Benz - Fujitsu - Cortal Consors
www.happycloudsolutions.com.au 4
| Cybercrime StatisticsWorldwide and specific threats to Australia
Keynote Template
www.happycloudsolutions.com.au 7
Australian Cyber Security Surveyfrom 150 respondents, mostly larger companies
50%Experienced at least one cyber incident in the past 12 months
90%Have implemented an IT Security Framework
72%Experienced a Ransomware incident
59%Experienced targeted email attack
97%Small to Medium Businesses
|
www.happycloudsolutions.com.au 8
# Protection for SMEsHow Australian SMEs can protect themselves against cybercrime
Keynote Template
www.happycloudsolutions.com.au 9
Potential Ressources for SMEs
Australian Signals Directorate
Australian Government Information Security Manual
Australian Cyber Security Center
The centre brings together existing cyber security capabilities
across government entities
Cert Australia
Main point of contact for major Australian businesses, e.g.
operators of Australia’s critical infrastructure and other systems
of national interest
Stay Smart Online
Small business guide will be launched on 10th October
#
www.happycloudsolutions.com.au 10
German IT Baseline Protection
Same Challenges
99.3% Small and Medium Businesses in Germany and how to protect them from online threats
Simple Approach
Should be comparably easy to implement and not require specialist knowledgeAssetThreat
Vulnerability Baseline Protection Catalogs
Offer a "cookbook recipe" for a normal level of protection without the need for costly
security analyses
IT Baseline Protection
Released in 1994 to help SMBs to encompass standard security measures for typical IT systems with normal protection needs
#
www.happycloudsolutions.com.au 11
IT Baseline Protection Methodology
Baseline Security CheckPerform security assessment by using vulnerability scanner and with the help of interviews
Risk assessmentAsses the risks found and provide recommendations based on severity
Map IT StructureIdentify all IT systems and applications in use and
policies and procedures in place
Determine Protection needsAssign level of protection needed by type of
information stored or processed
&
% #
$
#
www.happycloudsolutions.com.au 12
Benefits for SMEs
' Tested Framework
Well Tested Framework
In use for over 20 years by SMEs in Germany. It is the most widely adopted IT security framework and in line with ISO/IEC 27001
Status Quo of your IT
Provides a snapshot of the current IT environment including processes, procedures and human factors.
( Status Quo
Structured Results
Get actionable results that highlight the areas of most concern with recommendations on how to remedy them.
) Structured Results
Cost Efficient to ImplementUse of open source tools and integration between tools enables a low cost, low overhead implementation.
* Cost Efficient
#