Upload
surfwatch-labs
View
240
Download
0
Tags:
Embed Size (px)
Citation preview
Personalized Cyber Risk Intelligence for Your Business
3
We Start Where Traditional Threat Intelligence Stops•Powerful cyber risk analytics and practical BI apps that link strategic cybersecurity insights to your key business operations
The POS Security Problem
• Easy, Low-Hanging Fruit for Cybercriminals– Point-of-Sale Systems
process sensitive payment and PII
– PCI Compliance Has Little Bearing on Your Risk
– Many Outdated Systems
• This is Not Just a Technical Problem… It’s a REAL Business Problem
4
The Butterfly Effect
12
• As defenses evolve, so too do cybercriminals!
• Beyond credit card info, POS attacks use stolen PII info in other ways:– Identity Theft– Phishing– Man-in-the-middle attacks– Shutting down technical
infrastructure– And more…
Establish a Threat Intelligence Program for 360° View of Your Cyber Risk
14
Collect and Analyze Threat Intelligence from Inside and Outside Your Company Walls
5 Building Blocks to Reduce Your POS Risk
After you gain Situational Awareness you can build out key security tactics:
1.Establish a repeatable vulnerability management process based on your risk and exposure
2.Deploy robust identity authentication, authorization and accounting
3.Leverage data encryption AND data tokenization
4.Segment your network zones
5.Look to Critical Controls and OWASP as additional checks
15
SurfWatch Labs Resources
16
• Download Our Special Report on POS Insecurity: Cyber Risk Trends and Analysishttp://info.surfwatchlabs.com/POS-Cyber-Report
• Learn About SurfWatch C-Suite:
• Product Overview: https://www.surfwatchlabs.com/apps/c-suite
• Product Review by SC Mag: http://www.scmagazine.com/surfwatch-c-suite/review/4324/
• Schedule Your Personalized Demonstrationhttp://info.surfwatchlabs.com/request-demo