SlideShare a Scribd company logo
How to save your company
from having a security breach
Matej Zachar
Project & Security Manager
Ota Čermák
Business Development
Manager
SAFETICA TECHNOLOGIES
• ESET Technology Alliance Partner
• Czech company
• 60 employees
• Developing security software since 2009
• 30 000 protected devices in 50 countries
with over 300 customers
How to safe your company from having a security breach
• Human error
• Abuse / fraud
• Problems in processes
ROOT CAUSES OF DATA LEAKAGE
• Chelsea and Westminster Hospital NHS Foundation
Trust has been fined £180,000 after revealing the
email addresses of more than 700 users of HIV
service. The incident happened when a member of
staff was sending newsletter and used field CC:
instead of BCC:
• (9.5.2016, ico.org.uk)
HUMAN ERROR
• 78 % of companies have already had a data leak
caused by an internal source
• 50 % of employees take sensitive data with them
when leaving a job
• 80 % of these plan to use this data in their new job
• (Ponemon Institute)
ABUSE / FRAUD
• Missing policies / guidelines
• E.g. data transfer
• Insufficient user awareness
• Lack of control mechanisms
PROCESSES
How to safe your company from having a security breach
• June 2016: Massive data leak
• 1.2 million customer records
• Insider sold the data
• 133.000€ Fine
• Front page headlines
• They admitted incident
• (But played it down)
X
• Crisis communication
• Remediation
• Transparency
AUTOMOTIVE
ENGINEERING
• Every company.
WHO IS THE TARGET?
• Production companies and
manufacturing
• Private Health care
• Logistics
• Automotive
• Public sector
• Financial sector, insurance,
advisory
• Law firms
• Security forces, military
and suppliers
• Utilities
• Services
• Pharmacy
• Food and Beverages
WHO IS THE TARGET?
• Every company.
• Personal data - GDPR
• Know-how
• Financial data
• Employees
WHO IS THE TARGET?
• Get support from board
• Identify risks
• Classify the data
• Secure their perimeter
• Implement policies
• Provide training
HOW TO DO IT
• „Open“ companies
• Agile development
• „Closed“ firms
• Hybrid approach
• Startups, young companies
CHOOSE THE RIGHT APPROACH
• Access to data
• Secure transfer
• User behavior
• Insider threat
FIND AND SOLVE ISSUES
• Be open to your employees
• Implement policies
• Train users
• Be aware of new and leaving staff
• Discuss everything!
DEVELOP RESPONSIBILITY
• Data Loss Prevention
• Security audit
• Encryption
• Mobile security
IMPLEMENT TECHNOLOGY
• Based in Czech republic
• Creating products for physical security
• Management realizes
the importance of data
1. Policies
2. Training using DLP notifications
3. Step-by-step protection of know-how
4. Monitoring of leaving employees
Q & A
THANK YOU FOR YOUR TIME
ota.cermak@safetica.com
Matej Zachar
Project & Security Manager
Ota Čermák
Channel Sales Manager
matej.zachar@safetica.com

More Related Content

PPTX
Data breach presentation
PPTX
Data Security Breach: The Sony & Staples Story
PPTX
Target data breach presentation
PDF
5 Critical Steps to Handling a Security Breach
PPTX
Security v. Privacy: the great debate
PDF
Target data breach case study
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
PPTX
CYBER SECURITY FOR LAW FIRMS
Data breach presentation
Data Security Breach: The Sony & Staples Story
Target data breach presentation
5 Critical Steps to Handling a Security Breach
Security v. Privacy: the great debate
Target data breach case study
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
CYBER SECURITY FOR LAW FIRMS

What's hot (14)

PDF
Cyber Security work shop by Kapil Mehrotra
PDF
SingHealth Cyber Attack (project)
PDF
Understanding Identity Management and Security.
PDF
Cyber Security 101: What Your Agency Needs to Know
PDF
Your organization is at risk! Upgrade your IT security & IT governance now.
PDF
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
PDF
Target Breach Analysis
PPT
Policies and Law in IT
PDF
2014 ota databreach3
PDF
Improve Cybersecurity Education Or Awareness Training
PPTX
A Brave New World of Cyber Security and Data Breach
PDF
Information security and research data
PDF
Health Information Privacy and Security (October 21, 2020)
PDF
Practical approach to combating cyber crimes
Cyber Security work shop by Kapil Mehrotra
SingHealth Cyber Attack (project)
Understanding Identity Management and Security.
Cyber Security 101: What Your Agency Needs to Know
Your organization is at risk! Upgrade your IT security & IT governance now.
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Target Breach Analysis
Policies and Law in IT
2014 ota databreach3
Improve Cybersecurity Education Or Awareness Training
A Brave New World of Cyber Security and Data Breach
Information security and research data
Health Information Privacy and Security (October 21, 2020)
Practical approach to combating cyber crimes
Ad

Viewers also liked (8)

PPTX
Sony Playstation Hack Presentation
PDF
Security Breach Laws
PPTX
security in it (data and cyber security)
PPT
Current Emerging Threats
PPTX
Preparing for a Security Breach
PPTX
When a Data Breach Happens, What's Your Plan?
PPTX
Vlvj corp ppt
PPTX
Data Security Breach – knowing the risks and protecting your business
Sony Playstation Hack Presentation
Security Breach Laws
security in it (data and cyber security)
Current Emerging Threats
Preparing for a Security Breach
When a Data Breach Happens, What's Your Plan?
Vlvj corp ppt
Data Security Breach – knowing the risks and protecting your business
Ad

Similar to How to safe your company from having a security breach (20)

PPTX
Will Your Business Get Hacked? #HumberBizWeek2016
PPTX
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
PPTX
Will Your Business Get Hacked in 2016?
PDF
Data Protection - Safeguarding Your Business in the Digital Age.pdf
PPTX
Impact of i.t system breaches
PDF
Drivelock modern approach of it security & amp; encryption solution -whitep...
PPTX
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PPTX
Community IT Webinar - IT Security for Nonprofits
PPT
George Gavras 2010 Fowler Seminar
PDF
Data Security Regulatory Lansdcape
PPTX
IAPP - Trust is Terrible Thing to Waste
PDF
Accelerating Enhanced Threat Identification and Incident Investigation
PPTX
Microsoft DATA Protection To Put secure.
PPTX
Security Snake Oil Cycle 2019
PDF
What I found in my data: True data security stories
PPTX
Cyber Security - Things you need to know
PDF
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
PDF
Prepare For Breaches Like a Pro
PDF
The State of Data Security
Will Your Business Get Hacked? #HumberBizWeek2016
Will Your Business Get Hacked? - #HumberBizWeek: 08.06.2016 @ Smailes Goldie
Will Your Business Get Hacked in 2016?
Data Protection - Safeguarding Your Business in the Digital Age.pdf
Impact of i.t system breaches
Drivelock modern approach of it security & amp; encryption solution -whitep...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Community IT Webinar - IT Security for Nonprofits
George Gavras 2010 Fowler Seminar
Data Security Regulatory Lansdcape
IAPP - Trust is Terrible Thing to Waste
Accelerating Enhanced Threat Identification and Incident Investigation
Microsoft DATA Protection To Put secure.
Security Snake Oil Cycle 2019
What I found in my data: True data security stories
Cyber Security - Things you need to know
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
Prepare For Breaches Like a Pro
The State of Data Security

More from Baltimax (12)

PDF
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
PDF
Bendrasis duomenų apsaugos reglamentas
PPTX
Integruotas IT valdymas ir apsauga su „Axence nVision 9“
PDF
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
PDF
RingTime telefoninės sistemos
PDF
Svarbiausios ESET technologijos
PDF
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimu
PDF
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
PDF
Data Sanitization: What, Why, When and How?
PDF
Duomenų praradimo rizika ir atsarginių kopijų svarba
PDF
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
PDF
„Baltimax“ produktų katalogas
The Tableau Experience Kaunas - TOC Sales and Marketing prezentacija
Bendrasis duomenų apsaugos reglamentas
Integruotas IT valdymas ir apsauga su „Axence nVision 9“
Kibernetinis saugumas: bendrasis asmeninių duomenų apsaugos reglamentas
RingTime telefoninės sistemos
Svarbiausios ESET technologijos
Rizikos susijusios su nelicencijuotos programinės įrangos naudojimu
Kibernetinis saugumas: kaip keisis situacija pradėjus taikyti naujas duomenų ...
Data Sanitization: What, Why, When and How?
Duomenų praradimo rizika ir atsarginių kopijų svarba
"Baltimax" œ– progresīvi risinājumi Jūsu biznesam
„Baltimax“ produktų katalogas

Recently uploaded (20)

PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PPTX
Cybersecurity: Protecting the Digital World
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Cost to Outsource Software Development in 2025
PDF
Time Tracking Features That Teams and Organizations Actually Need
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
STL Containers in C++ : Sequence Container : Vector
PPTX
Trending Python Topics for Data Visualization in 2025
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
chapter 5 systemdesign2008.pptx for cimputer science students
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
Oracle Fusion HCM Cloud Demo for Beginners
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Designing Intelligence for the Shop Floor.pdf
Autodesk AutoCAD Crack Free Download 2025
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Cybersecurity: Protecting the Digital World
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Cost to Outsource Software Development in 2025
Time Tracking Features That Teams and Organizations Actually Need
Wondershare Recoverit Full Crack New Version (Latest 2025)
MCP Security Tutorial - Beginner to Advanced
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
STL Containers in C++ : Sequence Container : Vector
Trending Python Topics for Data Visualization in 2025
Advanced SystemCare Ultimate Crack + Portable (2025)
How Tridens DevSecOps Ensures Compliance, Security, and Agility
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
chapter 5 systemdesign2008.pptx for cimputer science students

How to safe your company from having a security breach

  • 1. How to save your company from having a security breach Matej Zachar Project & Security Manager Ota Čermák Business Development Manager
  • 2. SAFETICA TECHNOLOGIES • ESET Technology Alliance Partner • Czech company • 60 employees • Developing security software since 2009 • 30 000 protected devices in 50 countries with over 300 customers
  • 4. • Human error • Abuse / fraud • Problems in processes ROOT CAUSES OF DATA LEAKAGE
  • 5. • Chelsea and Westminster Hospital NHS Foundation Trust has been fined £180,000 after revealing the email addresses of more than 700 users of HIV service. The incident happened when a member of staff was sending newsletter and used field CC: instead of BCC: • (9.5.2016, ico.org.uk) HUMAN ERROR
  • 6. • 78 % of companies have already had a data leak caused by an internal source • 50 % of employees take sensitive data with them when leaving a job • 80 % of these plan to use this data in their new job • (Ponemon Institute) ABUSE / FRAUD
  • 7. • Missing policies / guidelines • E.g. data transfer • Insufficient user awareness • Lack of control mechanisms PROCESSES
  • 9. • June 2016: Massive data leak • 1.2 million customer records • Insider sold the data • 133.000€ Fine • Front page headlines
  • 10. • They admitted incident • (But played it down) X • Crisis communication • Remediation • Transparency
  • 13. • Every company. WHO IS THE TARGET?
  • 14. • Production companies and manufacturing • Private Health care • Logistics • Automotive • Public sector • Financial sector, insurance, advisory • Law firms • Security forces, military and suppliers • Utilities • Services • Pharmacy • Food and Beverages WHO IS THE TARGET?
  • 15. • Every company. • Personal data - GDPR • Know-how • Financial data • Employees WHO IS THE TARGET?
  • 16. • Get support from board • Identify risks • Classify the data • Secure their perimeter • Implement policies • Provide training HOW TO DO IT
  • 17. • „Open“ companies • Agile development • „Closed“ firms • Hybrid approach • Startups, young companies CHOOSE THE RIGHT APPROACH
  • 18. • Access to data • Secure transfer • User behavior • Insider threat FIND AND SOLVE ISSUES
  • 19. • Be open to your employees • Implement policies • Train users • Be aware of new and leaving staff • Discuss everything! DEVELOP RESPONSIBILITY
  • 20. • Data Loss Prevention • Security audit • Encryption • Mobile security IMPLEMENT TECHNOLOGY
  • 21. • Based in Czech republic • Creating products for physical security • Management realizes the importance of data
  • 22. 1. Policies 2. Training using DLP notifications 3. Step-by-step protection of know-how 4. Monitoring of leaving employees
  • 23. Q & A
  • 24. THANK YOU FOR YOUR TIME ota.cermak@safetica.com Matej Zachar Project & Security Manager Ota Čermák Channel Sales Manager matej.zachar@safetica.com