• Like

Cybersecurity Innovations: Impact on Key Sectors

  • 525 views
Uploaded on

Listen On Demand: …

Listen On Demand:
https://www.brighttalk.com/webcast/5567/123215

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
525
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
14
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cyber Security Innovations Impact on Key Sectors Debarun Guha Thakurta, Research Analyst Technical Insights-ICT 02-09-2014 © 2014 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
  • 2. 2 Debarun Guha Thakurta Functional Expertise Experience in market and technology research and consulting - Primary research, secondary research, analysis, technical write-ups and presentations - Tracking innovations in the Information and Communication technology domain - Expertise in technology evaluation, technology roadmaps, analysis Rich IT consultancy experience, which includes successful implementation of customized ERP solutions. Particular expertise in: - Requirement Analysis - Client Handling - Business Development Industry Expertise Information and Communication Technology: Cloud Computing Technology, Indoor Positioning Technology, Digital Payments Technology IT consultancy experience base covering broad range of sectors, leveraging long-standing working relationships with leading industry participants, Senior Executives in - Education - Tourism - Manufacturing What I bring to the Team • Extensive knowledge of IT consultancy • Strong requirement analysis, analytical and problem solving skills • Experience in business development and client interaction. Career Highlights Prior to joining Frost & Sullivan, was extensively involved in providing IT consultancy services. Education ı MBA in Information and Systems Management from Jadavpur University, Kolkata, India ı BTech in Computer Science and Engineering from West Bengal University of Technology, Kolkata, India Place photo here Shadow Background for effect Debarun Guha Thakurta Research Analyst Technical Insights Frost & Sullivan Global Kolkata
  • 3. 3 Focus Points Agenda ı Why Cyber Security is Essential? ı Recent Attack Trends ı Key Sectors under Frequent Attack ı Impact of Cyber Attacks on Key Sectors ı Types of Innovations that can Protect against Cyber Attacks ı Cyber Security Roadmap
  • 4. 4 WHY CYBER SECURITY IS ESSENTIAL? Access Security Network Security Data Security Application Security Security of Autonomous Systems National Security Sectors Targeted Lack of User Awareness of Security Growth of Internet Constantly Emerging Attacks Lack of Threat Information Sharing Lack of Skilled Security Personnel
  • 5. 5 RECENTLY EMERGING ATTACK TYPES Spear Phishing BeEF Toolkit Social Phishing CryptoLocker TimThumb Attacks SEO Poisoning
  • 6. 6 Health Information Insurance Information Medical Devices With the digitization of health records into electronic health records (EHRs), the need to secure them is ever increasing. Unauthorized access to EHRs could lead to leakage of confidential financial details from health insurance databases. Connected medical devices are being used for transmission of malicious traffic. Unauthorized access and control could lead to breach of data and can also cause harm to patients. IMPACT OF CYBER ATTACKS ON KEY SECTORS HEALTHCARE LOW HIGH LOW HIGH LOW HIGH
  • 7. 7 Communication Networks Computing Systems Storage Applications and Servers Disruption of communication channels is done by using advanced attacking methods such as DDoS, router level attacks, high energy radio frequency attacks and so on. Infiltration in the computing systems by using methods such as spoofing, phishing, vishing could result in access to secured computing systems and networks. Compromised computing systems and networks provide a gateway to data storage systems, which could lead to breach of confidential data. Sophisticated attacks on servers and applications by using DNS and application level attacks could lead to disruption of critical services. IMPACT OF CYBER ATTACKS ON KEY SECTORS INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) LOW HIGH LOW HIGH LOW HIGH LOW HIGH
  • 8. 8 Communication Channel Automated Units Supply Chain R&D Data Attackers often try to disrupt the aerospace and defense communication channels aiming to obstruct interaction with base. In addition, focus is also on getting access to the conversations. Cyber attackers target to gain unauthorized access on the automated units and computers systems such as radars in order to disrupt and abuse the same. Cyber attacks in aerospace and defense computing systems are also focused at obtaining access to the supply chain information. Several nation and organization sponsored hacktivists aim to gain access to the aerospace and defense data in order to obtain the R&D information. Such data are immensely valuable to know for rival nations and enterprises. IMPACT OF CYBER ATTACKS ON KEY SECTORS AEROSPACE AND DEFENSE (A&D) LOW HIGH LOW HIGH LOW HIGH LOW HIGH
  • 9. 9 Data Communication Channels User Identity User Accounts Cyber attackers often target at disrupting data integrity in the banking and finance sector. This makes it easier for them to make fraudulent transactions without getting identified. Disruption of communication channels can lead to network outage, resulting in incomplete or blocked transactions and data transfers. Identity theft is a common objective of cyber attackers in this sector. Stolen identities are frequently used to access user accounts and make fraudulent transactions. Account takeover is increasing everyday. Malware-, phishing-, and spyware-based attacks are leveraged by cyber attackers to gain access to user accounts. IMPACT OF CYBER ATTACKS ON KEY SECTORS BANKING AND FINANCE LOW HIGH LOW HIGH LOW HIGH LOW HIGH
  • 10. 10 Power Grids Internet of Things Automated Control Systems R&D Data Targeted attacks on control systems of power grids can result in prolonged power outages in large areas leading to disruption of essential services such as healthcare, food, water, communication, and so on. While Internet of Things (IoT) promises to connect various physical devices, it widens the attack surface, which can be utilized by cyber attackers to infiltrate networks. With the concept of Industry 4.0 setting in to develop smart factories with automated intelligent processes, the chances of cyber attacks to disrupt the operations will evolve. Effects could be fatal in energy and manufacturing sectors. Cyber espionage is a malicious practice to obtain rich R&D data for the energy and manufacturing sectors. IMPACT OF CYBER ATTACKS ON KEY SECTORS MANUFACTURING AND ENERGY LOW HIGH LOW HIGH LOW HIGH LOW HIGH
  • 11. 11 Low High How it helps? • Identify and block compromised devices • Control data access using policies • Block specific malicious applications • Clear data if device is lost • Track device location using GPS Present adoption rates across industries Innovation Themes BYOD security is high on demand with innovations in the areas of: ı Comprehensive BYOD Management ı Mobile Application Management ı Mobile Data Management ı Mobile Device Management Innovations and Innovators Technology Capability ı Device Behavior Monitoring ı Network Access Monitoring ı Application Behavior Monitoring ı Data Access Protection ı Remote Device Monitoring and Control ı AirWatch (VMware) ı McAfee EMM ı MobileIron EMM ı Citrix XenMobile ı IBM MaaS360 MDM ı Symantec Mobile Management ı BlackBerry BES10 ı CA technologies MDM INNOVATIONS ENABLING CYBER SECURITY DEVICE SECURITY
  • 12. 12 Low High How it helps? • Protection against Denial of Service (DoS), Distributed Denial of Service (DDoS) • Network Vulnerability Assessment • Protection against DNS attacks • Intrusion detection and prevention Present adoption rate across industries Innovation Themes In addition to traditional anti-virus and anti-malware solutions, target specific network security solutions are high on demand: ı Flexible DNS Security Appliance ı LTE Small Cell Security ı Secure Gateways ı Intrusion Detection Systems ı Next Generation Firewalls Innovations and Innovators Technology Capability ı Access Protection ı Network Traffic Behavior Analysis ı Predictive Threat Analysis ı Machine Learning ı Skybox Vulnerability Control (Skybox Security) ı LTE Small Cell Security (Clavister AB) ı Barracuda Firewall (Barracuda Networks) ı Perception (Chemring Group PLC) ı Infoblox 4030 DNS Caching Appliance (Infoblox) ı Core Insight 3.0 (Core SDI Inc.) ı Arbor Cloud (Arbor Networks Inc.) INNOVATIONS ENABLING CYBER SECURITY NETWORK SECURITY
  • 13. 13 INNOVATIONS ENABLING CYBER SECURITY DATA & APPLICATIONS SECURITY Low High How it helps? • Cost effective less complex cloud based security • Secured application execution environment • Advanced data security • Data integrity Present adoption rate across industries Innovation Themes ı Cloud Security ı Big Data Security ı Security-as-a-Service ı Advanced Encryption and Key Management ı Internet of Things ı E-mail, Application, Data, Access security Innovations and Innovators Technology Capability ı Access Protection ı Cloud-Based Encryption ı M2M Secured Communication ı Biometric Authentication ı CloudLock Selective Encryption (CloudLock Inc.) ı FireEye® Email Threat Prevention Cloud (FireEye Inc.) ı BeyondSaaS (BeyondTrust Inc) ı SPxConnect (Security First Corp.)
  • 14. 14 Cyber Security Roadmap Encryption and Key Short Term (2014-2016) Long Term (>2020) Medium Term (2017-2020) Management Vulnerability Assessment Endpoint Security for IoT Predictive Threat Analytics Cognitive Security
  • 15. 15 Next Steps Develop Your Visionary and Innovative Skills Growth Partnership Service Share your growth thought leadership and ideas or join our GIL Global Community Join our GIL Community Newsletter Keep abreast of innovative growth opportunities Phone: 1-877-GOFROST (463-7678) Email: myfrost@frost.com
  • 16. 16 Your Feedback is Important to Us What would you like to see from Frost & Sullivan? Growth Forecasts? Competitive Structure? Emerging Trends? Strategic Recommendations? Other? Please inform us by “Rating” this presentation.
  • 17. 17 Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter http://www.facebook.com/FrostandSullivan https://www.linkedin.com/groups/Technical-Insights-3197215 http://www.slideshare.net/FrostandSullivan http://twitter.com/frost_sullivan
  • 18. 18 For Additional Information Clarissa Castaneda Corporate Communications Information & Communication Technologies (210) 210.477.8481 Clarissa.castaneda@frost.com Debarun Guha Thakurta Research Analyst Technical Insights 91-33- 6627-3015 debarunt@frost.com Vedavalli Rangan Research Director Technical Insights 91-44-66814100 vrangan@frost.com • Bernard Weber •Sales Director, Technical Insights (Europe) •+44 207 343 8352 •bweber@frost.com