+ All Categories
Home > Documents > Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud...

Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud...

Date post: 24-May-2020
Category:
Upload: others
View: 12 times
Download: 0 times
Share this document with a friend
19
Cyber Security and Innovation Protecting Business IoT, Cloud and Mobile Systems Jonathan Jackson Head of Technical Solutions and Cyber, APJ
Transcript
Page 1: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

Cyber Security and Innovation

Protecting Business IoT, Cloud and Mobile Systems

Jonathan Jackson

Head of Technical Solutions and Cyber, APJ

Page 2: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 2

2

Key Challenges in Financial Services Industry

The adoption of emerging digital technologies can have unintended and discomforting

consequences, leading to severe business implications, such as negative impacts on the

financial services providers' reputations.

Financial services consumers have an ambivalent attitude toward digital technologies and the

information extracted from these technologies that can't be ignored by business and IT leaders.

Financial services business and IT leaders have identified security and privacy concerns as

one of the major challenges of their digital business efforts, but they consider these issues less

relevant than budget and cost constraints. Many are being forced to change with GDPR and

MiFID2 coming in Early 2018

CyberCrime is rampant. Financial services are under constant attack. There is no silver bullet

*Gartner, 2015

Page 3: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 3

In 2016 By 2020

6.4 billion connected things

3.9 billion smartphones

20.8 billion connected things

6.1 billion smartphones

Exploding Connections . . .

On average, 10 million new

“things” added every day

Source: Ericsson Mobility Report, November 2016

Page 4: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 4

Digital Transformation leads to Transforming Threat

Users and Endpoints are the weakest link

Page 5: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 5

of employees

access sensitive

company

information via

mobile 88%

of businesses say

mobile security

causes frustration

with employees82%of ANZ businesses

are worried about

the overall security

of enterprise

mobility 86%

Mobile devices

are perceived as

IT’s weakest link

in security

Security vs. Productivity

Page 6: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 6

Nearly ½ of mobilized

companies have

achieved business

benefit gains of 20%+

73%Have reduced IT

operations staff time

150%Average ROI for

business mobility

solutions

Mobility is Transforming Banking

Page 7: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

Cyberwarfare is the ATTACK VECTOR of the future

It’s cheaper and less risky than physical warfare and has NO GEOGRAPHICAL BORDERS

Page 8: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 8

Where Does Stolen Data End Up?

Page 9: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 9

Data Leakage/Theft

40 million credit card numbers stolen

70 million addresses, phone num. & other pieces of personal info

90 lawsuits $200 million = Net cost

Carding

Page 10: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 10

Monetizing Data Theft

Page 11: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 11

Case studies + Video

Using BlackBerry Software

Page 12: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 12

12

BlackBerry Secure

UEM

Apps

Endpoint Security

Information Sharing

Embedded Software

Android Software

BlackBerry Secure: secure productivity for future banking

BlackBerry unified

endpoint security

management, analytics,

communications, and

monitoring

Cloud, On-Premises, Hybrid

BlackBerry Secure Network

Page 13: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 13

13

Case Study: Financial Services

• QIC executives implemented BlackBerry’s Workspaces solution to secure sensitive and confidential documents for Workspaces superusers during high profile client investment ”deal room” negotiations

• QIC securely distribute, collaborate, edit and track privileged information shared with internal and external stakeholders

• Data leakage is prevented during W10 transformation after removal of USB access

• Secure external sharing functionality options for 3rd party collaboration aligned to MSFT O365 transformation strategy

• Business continuity via flexible secure access to highly sensitive files for internal and external users across all platforms of devices

“We are on a cloud Office 365 journey and to help us with

that we have utilized BlackBerry Workspaces as a tool to

enable us to connect and collaborate with our 3rd Parties. It

has certainly been an effective tool in helping us manage our

IT risks as we enter into the public cloud space.

Grant Slender,

IT Risk and Security Manager

Company-Wide secure document access, sharing and collaboration

designed to complement a Microsoft cloud platform

strategy

Page 14: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 14

14

Case Study: Macquarie University

• Macquarie University takes the safety of students and staff very seriously, particularly considering that security is one of the top three reasons students come to Australian universities.

• 40,000 Students and 3000 staff on a campuswith dozens of buildings across 126 hectares

• Ability to alert people on campus; but also the capability to alert buildings in the near vicinity at Macquarie Park

• AtHoc used to manage all types of crisis management, from cyber security to evacuations and student safety.

“As a world-class institution, we require world-class technology to ensure

Macquarie University is ‘crisis-ready’. Knowing that the AtHoc solution we

have in place is used by US and Australian Defence Forces gives us

peace of mind, but better still, we found the ease of deployment, ongoing

management, scalability and multi-platform reach enables the university to

keep our staff and students safe – 24/7.”

John Durbridge,

Director, Campus Security

Secure Multi Channel Crisis Communication

Page 15: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 15

15

Extending the Enterprise – which lane are you?

Device Management

MDM

• Market was BlackBerry only

• Secure Email

Device Management

(Circa 2012)

SMARTPHONE

EMM

Mobility Management

(2013 – 2014)

• Evolution of cross platform

• Focus on BYOD

TABLETSMARTPHONE

EMM

Applications

Enterprise Management

(2015 – 2016)

• Tablets=>Laptops=>Wearables

• Enterprise Applications

Professional Services

COMPUTER WEARABLES

UEM

Professional Services

Applications

Embedded & EoT

• Enterprise of Things

• Seamless Workflow

Extending the Enterprise

(2017+)

Page 16: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 16

16

Online Banking

Unified account information across

databases achieved through:

• Syncing of information across

division to offer a unified user

experience.

• Fast account opening which

causes increase of revenue.

• Instantly updated workflow

between databases.

BlackBerry Financial Services Reference ArchitectureWealth Management

• Clients personal information (PII) is fully protected Achieving

compliance agreement & positive corporate image.

C-Suite Travel - Mobile Productivity

Increased productivity and decreased

security risk.

• Highest level of security & privacy in

voice communication.

• Protected mobile networks used to share

confidential information.

Branch Client Interaction

Automatic process to schedule customer meeting

• Time-efficient processes to schedule and document

customer meetings

• Efficient collaboration between branches.

Secure Document Storage & Distribution

Lowered administrative costs, minimized security risks through.

• Unique document-centric security offering that provides the

access, collaboration and control of financial documents

necessary for financial services to drive productivity through

expediting transactions

Financial Brokerage

Cost reductions and increased security through

• Secure access, sharing and editing of

confidential documents

• Shorter processes, using instant

communication and remote collaboration,

using secure instant messaging, video

calling

Commercial Customer

Increased security and decrease in costs due to

• Cross platform unified comprehensive

management and security controls

• Ability to securely access, edit and share

confidential data and documents using

remote connectivity to firm servers and

accessing firm specific applications from

anywhere anytime

Mobilizing the Enterprise

Comprehensive, flexible and highly

scalable enterprise mobility:

• Secure multi-OS management of

devices, emails, contacts,

applications and other corporate

assets that are securely managed

and accessed through a separate

secure workspace

Page 17: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 17

17

Mobile Financial User Group (Australia and New Zealand)

MFUG

Working to provide a holistic overview of Financials Services mobility challenges

and solutions

Collaboration forum to share best practices and insights in Fin Services. Hear from

your peers and vendors

Include case studies or real-life customer/partner insights

Provide updates and tactics to prepare for regulatory changes

Targeting CISO’s, CRO’s and CDO’s and their teams

GDPR and MiFID2 Readiness forums

Launched in the UK recently and coming to Sydney and Melbourne in Q3 2017

GDPR applies to all companies worldwide that process personal data of EU citizens.

Data that has been stored within the EU and is transferred outside the EU boundary

will still be affected by the GDPR guidelines.

How do these impact Financial Services and what should you do to prepare?

What will be the cost of becoming compliant?

What will be the main challenges?

Page 18: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 18

BlackBerry Software

Securing Mobility end-to-end

Form Factors Ownership Models Containers/FrameworksOperating Systems Applications Content

Managed

Apps

BYOD(Bring Your Own Device)

COPE(Corporate Owned,

Personally Enabled)

COBO(Corporate Owned,

Business Only) Line of Business

Android for Work

Windows Store

for Business

Data Repositories

Page 19: Cyber Security and Innovation - FST · Cyber Security and Innovation Protecting Business IoT, Cloud ... of enterprise mobility 86 % Mobile devices are perceived as IT’s weakest

© 2016 BlackBerry. All Rights Reserved. 19

Questions?


Recommended