SlideShare a Scribd company logo
1 of 18
2015 Security Trends
(So far…)
Edward Vasko, CISSP
CEO
About Terra Verde
Terra Verde provides customized risk
management services and solutions to your
business.
Our mission is to provide value driven, high quality
cybersecurity services and solutions our clients will
recommend to their associates, partners and peers.
1
Trend Trend Trend Trend
Trends
2015 Top Security Trends
Information Security is undergoing huge growth and changes.
The general public is now more than ever painfully aware of IT
Security. Technology is changing at an accelerated rate, threats
are evolving almost at the same pace.
• Data from our Scottsdale Security Operations Center (SOC)
• Virtualization
• Monitoring, Defense, Testing, Intelligence
• Network, Cloud, Mobility
• Identity and Access Mgmt.
• PCI DSS Compliance
2
Data from our SOC (1/2)
At Terra Verde we operate a Security Operations Center
monitoring security related events for thousands of systems
nationwide. From January 2015 until yesterday these are the top
events flooding our Security Information and Event Management
systems:
• Outdated clients (including frameworks): flash, java, PHP.
• Automated attacks are targeting these outdated systems.
• Vulnerable clients susceptible to Heartbleed and POODLE are
being attacked.
• CHS systems was hacked due to this weakness
(https://www.trustedsec.com/august-2014/chs-hacked-heartbleed-
exclusive-trustedsec/)
3
Data from our SOC (1/2)
• XSS "cross-site scripting“ attacks are on the rise.
• Combined phishing attacks with Stored XSS are making a comeback.
• Shellshock exploits are being attempted at an increased rate.
• BrowserStack was hacked vie ShellShock
(http://www.esecurityplanet.com/network-security/browserstack-
hacked-via-shellshock.html)
4
Data from our SOC (2/2)
• Attempted SQL injections are evolving.
• Reconnaissance scanning from high threat countries such
as China and Russia have increased in 2015 Q1.
• The use of exploit kits including angler, fiesta, magnitude
and nuclear are gaining popularity.
5
Virtualization (1/2)
• Security is being Virtualized
• Most solutions we grew accustomed to in data centers are
now readily available and deployable in the cloud. Anything
from routers and switched to specialized appliances.
• Security controls are now residing in the cloud.
• More and more organizations are migrating from data
centers to the cloud. With those migrations technical
security controls are now in the cloud as well. The
challenge is brokering the co-existence of these solutions.
6
Virtualization (2/2)
• Unified Threat Management
• SIEMs and other sophisticated monitoring solutions are evolving to
correlate live data to system’s events, potential threats, likelihood
and providing actionable data.
• Hybrid Environments
• Virtualization efforts are leaving behind hybrid environments. Full
migration is not possible every time. Deploying security controls
and administering in both the physical data center and the cloud
are posing a new set of challenges for organizations.
7
Monitoring, Defense, Testing, Intelligence (1/2)
• Threat detection and response
• Monitoring, Protection and Response are no longer
enough. The model is evolving to the realms of
avoidance. The new model is becoming: Detect,
Respond, Predict and Prevent.
• Big data security analytics
• Defenses against targeted attacks are now driven by
risk and justified by data analytics and
aggregation.
8
Monitoring, Defense, Testing, Intelligence (2/2)
• Security intelligence
• Security intelligence is improving significantly. It no
longer serves one audience (IT) it is now serving the
business too.
• Context-aware controls
• Next generation data loss prevention tools can be
adjusted to deal with multiple contexts: endpoint,
network, user, entity, channels, products and
analytics.
9
Network, Cloud, Mobility (1/3)
• UTM – Unified Threat Management is not quite integrated at
all levels and all devices. There are still some limitations in
terms of support and compatibility with all nodes that
generate security related events.
• Cloud Access Security brokerage services
• Contextual information from physical and virtual assets are leading to
policy decisions around:
• Operations: load balancing, access control, content delivery network
optimization, etc.
• Security: identity management, logging, monitoring, data loss prevention,
malware analysis, etc.
10
Network, Cloud, Mobility (2/3)
• Website protection
• Web application firewalls are being put to the test and they are
delivering exceptional services (not after some pain, you get what
you pay for and more importantly what you configured for)
• "Brobot" and "Kamikaze/Toxin“ botnets keep being used to launch
DDOS attacks toward financial institutions. Compromised high
bandwidth webservers with vulnerable content management
systems (CMS) are being used to upload attack scripts to the high
bandwidth servers.
11
Network, Cloud, Mobility (3/3)
• Endpoint breach shifting to mobile devices
• Increased number of threats are targeting mobile platforms.
• Researchers have demonstrated success rate of over 90%
(http://www.fiercewireless.com/tech/story/researchers-demo-92-
success-rate-hacking-smartphone-apps/2014-08-24)
• Smartphone-based POS applications attacks are on the rise.
• Mobile POS and app-based wallets are being targeted
• Most attacks on mobile devices still require human collaboration:
• Trojan, Trojan downloaders, Trojan-SMS, Trojan-spy,
backdoors, adware, etc.
12
PCI DSS Compliance
Payment Card Industry (PCI DSS)
• Version 3.0 introduced multiple challenges:
• Legal agreements 12.8.2
• Secure protocols (SSL)
• Card Data environments scope are increasingly challenged with
cloud solutions.
• Tokenization offers and solutions are not articulating vendor’s
responsibilities.
• EMV implementation deadlines are fast approaching.
• Requirement 9.9: Physical access and point of sale
13
THANK YOU!
Questions?
Edward.Vasko@tvrms.com
Office: 480-840-1744
info@TVRMS.com
http://www.TVRMS.com
About Terra Verde
About
• Established in 2008
• Headquartered in Scottsdale
• Payment Card Industry Qualified
Security Assessor – PCI QSA
• Pragmatic solutions to solve
problems
15
Key differentiators
• Objective and certified
• Experienced & dedicated
• Service team averages 18 years
experience
Primary markets served
• Health Care
• Financial Institutions
• Gaming/Hospitality
• Retail
• Technology
Background
• 40 FTEs
• Hundreds of engagements performed
worldwide
• Largest AZ headquartered security
company
Terra Verde Services
Assessment/Testing
• Penetration testing
• Vulnerability assessment
• Technical risk assessment
• Web security assessment
• Physical security assessment
Security Strategy
• Maturity assessment
• Interim leadership
• Program
support/implementation
• Control implementation
• Secure SDLC
Technology Operational Risk
• Advisory services
• Expert Witness
• Forensics/Incident Response
• Project Management
16
Compliance & Audit
PCI, HIPAA, SOX, FTC, FISMA, CSP,
ISO, etc.
Terra Verde Solutions
Managed Security
• Device monitoring
• Security device
management
• Web application firewall
• Vulnerability Management
• Compliance portal
• Patching
• 24x7 US based SOC
Audit Documentation
• Eliminate audit fire drills
• “Business as Usual”
• Reduce compliance costs
Application Monitoring
• Metrics
• Performance/availability
• Secure SDLC
17

More Related Content

What's hot

Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceIvanti
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017EQS Group
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHEQS Group
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDragos, Inc.
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechDell EMC World
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity GroupsDragos, Inc.
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_InsightTim Bell
 

What's hot (20)

Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch Intelligence
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_Insight
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 

Viewers also liked

Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information SecurityCompTIA
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Shahar Geiger Maor
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Les xarxes socials
Les xarxes socialsLes xarxes socials
Les xarxes socialsXSAlejandroP
 
Weather forecast powerpoint
Weather forecast powerpointWeather forecast powerpoint
Weather forecast powerpointalaynasandefur
 
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~orthomedico
 
TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内yamato-c
 
Topic mother’s day
Topic mother’s dayTopic mother’s day
Topic mother’s daytappasarn
 
PCI 3.0 – What You Need to Know
PCI 3.0 – What You Need to KnowPCI 3.0 – What You Need to Know
PCI 3.0 – What You Need to KnowTerra Verde
 
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-orthomedico
 
Irakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakIrakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakJavi Echarri
 
FXLab_platform_ru
FXLab_platform_ruFXLab_platform_ru
FXLab_platform_ruLyubich
 
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~orthomedico
 

Viewers also liked (20)

Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Les xarxes socials
Les xarxes socialsLes xarxes socials
Les xarxes socials
 
Weather forecast powerpoint
Weather forecast powerpointWeather forecast powerpoint
Weather forecast powerpoint
 
Super tech
Super techSuper tech
Super tech
 
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
 
TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内
 
Topic mother’s day
Topic mother’s dayTopic mother’s day
Topic mother’s day
 
PCI 3.0 – What You Need to Know
PCI 3.0 – What You Need to KnowPCI 3.0 – What You Need to Know
PCI 3.0 – What You Need to Know
 
New employees primer
New employees primerNew employees primer
New employees primer
 
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
 
Irakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakIrakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapak
 
FXLab_platform_ru
FXLab_platform_ruFXLab_platform_ru
FXLab_platform_ru
 
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
 
Designing a showroom
Designing a showroomDesigning a showroom
Designing a showroom
 
Gustar project
Gustar projectGustar project
Gustar project
 

Similar to 2015 Year to Date Security Trends

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Arushi00
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Alert Logic
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Netpluz Asia Pte Ltd
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Build a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecBuild a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecArrow ECS UK
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Marco Casassa Mont
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 

Similar to 2015 Year to Date Security Trends (20)

Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Build a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecBuild a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with Symantec
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 

Recently uploaded

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

2015 Year to Date Security Trends

  • 1. 2015 Security Trends (So far…) Edward Vasko, CISSP CEO
  • 2. About Terra Verde Terra Verde provides customized risk management services and solutions to your business. Our mission is to provide value driven, high quality cybersecurity services and solutions our clients will recommend to their associates, partners and peers. 1
  • 3. Trend Trend Trend Trend Trends 2015 Top Security Trends Information Security is undergoing huge growth and changes. The general public is now more than ever painfully aware of IT Security. Technology is changing at an accelerated rate, threats are evolving almost at the same pace. • Data from our Scottsdale Security Operations Center (SOC) • Virtualization • Monitoring, Defense, Testing, Intelligence • Network, Cloud, Mobility • Identity and Access Mgmt. • PCI DSS Compliance 2
  • 4. Data from our SOC (1/2) At Terra Verde we operate a Security Operations Center monitoring security related events for thousands of systems nationwide. From January 2015 until yesterday these are the top events flooding our Security Information and Event Management systems: • Outdated clients (including frameworks): flash, java, PHP. • Automated attacks are targeting these outdated systems. • Vulnerable clients susceptible to Heartbleed and POODLE are being attacked. • CHS systems was hacked due to this weakness (https://www.trustedsec.com/august-2014/chs-hacked-heartbleed- exclusive-trustedsec/) 3
  • 5. Data from our SOC (1/2) • XSS "cross-site scripting“ attacks are on the rise. • Combined phishing attacks with Stored XSS are making a comeback. • Shellshock exploits are being attempted at an increased rate. • BrowserStack was hacked vie ShellShock (http://www.esecurityplanet.com/network-security/browserstack- hacked-via-shellshock.html) 4
  • 6. Data from our SOC (2/2) • Attempted SQL injections are evolving. • Reconnaissance scanning from high threat countries such as China and Russia have increased in 2015 Q1. • The use of exploit kits including angler, fiesta, magnitude and nuclear are gaining popularity. 5
  • 7. Virtualization (1/2) • Security is being Virtualized • Most solutions we grew accustomed to in data centers are now readily available and deployable in the cloud. Anything from routers and switched to specialized appliances. • Security controls are now residing in the cloud. • More and more organizations are migrating from data centers to the cloud. With those migrations technical security controls are now in the cloud as well. The challenge is brokering the co-existence of these solutions. 6
  • 8. Virtualization (2/2) • Unified Threat Management • SIEMs and other sophisticated monitoring solutions are evolving to correlate live data to system’s events, potential threats, likelihood and providing actionable data. • Hybrid Environments • Virtualization efforts are leaving behind hybrid environments. Full migration is not possible every time. Deploying security controls and administering in both the physical data center and the cloud are posing a new set of challenges for organizations. 7
  • 9. Monitoring, Defense, Testing, Intelligence (1/2) • Threat detection and response • Monitoring, Protection and Response are no longer enough. The model is evolving to the realms of avoidance. The new model is becoming: Detect, Respond, Predict and Prevent. • Big data security analytics • Defenses against targeted attacks are now driven by risk and justified by data analytics and aggregation. 8
  • 10. Monitoring, Defense, Testing, Intelligence (2/2) • Security intelligence • Security intelligence is improving significantly. It no longer serves one audience (IT) it is now serving the business too. • Context-aware controls • Next generation data loss prevention tools can be adjusted to deal with multiple contexts: endpoint, network, user, entity, channels, products and analytics. 9
  • 11. Network, Cloud, Mobility (1/3) • UTM – Unified Threat Management is not quite integrated at all levels and all devices. There are still some limitations in terms of support and compatibility with all nodes that generate security related events. • Cloud Access Security brokerage services • Contextual information from physical and virtual assets are leading to policy decisions around: • Operations: load balancing, access control, content delivery network optimization, etc. • Security: identity management, logging, monitoring, data loss prevention, malware analysis, etc. 10
  • 12. Network, Cloud, Mobility (2/3) • Website protection • Web application firewalls are being put to the test and they are delivering exceptional services (not after some pain, you get what you pay for and more importantly what you configured for) • "Brobot" and "Kamikaze/Toxin“ botnets keep being used to launch DDOS attacks toward financial institutions. Compromised high bandwidth webservers with vulnerable content management systems (CMS) are being used to upload attack scripts to the high bandwidth servers. 11
  • 13. Network, Cloud, Mobility (3/3) • Endpoint breach shifting to mobile devices • Increased number of threats are targeting mobile platforms. • Researchers have demonstrated success rate of over 90% (http://www.fiercewireless.com/tech/story/researchers-demo-92- success-rate-hacking-smartphone-apps/2014-08-24) • Smartphone-based POS applications attacks are on the rise. • Mobile POS and app-based wallets are being targeted • Most attacks on mobile devices still require human collaboration: • Trojan, Trojan downloaders, Trojan-SMS, Trojan-spy, backdoors, adware, etc. 12
  • 14. PCI DSS Compliance Payment Card Industry (PCI DSS) • Version 3.0 introduced multiple challenges: • Legal agreements 12.8.2 • Secure protocols (SSL) • Card Data environments scope are increasingly challenged with cloud solutions. • Tokenization offers and solutions are not articulating vendor’s responsibilities. • EMV implementation deadlines are fast approaching. • Requirement 9.9: Physical access and point of sale 13
  • 16. About Terra Verde About • Established in 2008 • Headquartered in Scottsdale • Payment Card Industry Qualified Security Assessor – PCI QSA • Pragmatic solutions to solve problems 15 Key differentiators • Objective and certified • Experienced & dedicated • Service team averages 18 years experience Primary markets served • Health Care • Financial Institutions • Gaming/Hospitality • Retail • Technology Background • 40 FTEs • Hundreds of engagements performed worldwide • Largest AZ headquartered security company
  • 17. Terra Verde Services Assessment/Testing • Penetration testing • Vulnerability assessment • Technical risk assessment • Web security assessment • Physical security assessment Security Strategy • Maturity assessment • Interim leadership • Program support/implementation • Control implementation • Secure SDLC Technology Operational Risk • Advisory services • Expert Witness • Forensics/Incident Response • Project Management 16 Compliance & Audit PCI, HIPAA, SOX, FTC, FISMA, CSP, ISO, etc.
  • 18. Terra Verde Solutions Managed Security • Device monitoring • Security device management • Web application firewall • Vulnerability Management • Compliance portal • Patching • 24x7 US based SOC Audit Documentation • Eliminate audit fire drills • “Business as Usual” • Reduce compliance costs Application Monitoring • Metrics • Performance/availability • Secure SDLC 17