Your SlideShare is downloading. ×
0
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
IT SECURITY:
2014 THREATS...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
The 2014 Global State of ...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
THE BATTLE FOR PRIVACY
RE...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserve...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserve...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2013:
MAJOR TRENDS
PERSON...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserve...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserve...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserve...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserve...
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Resources
IT Security 201...
Upcoming SlideShare
Loading in...5
×

Tier-3 Huntsman - IT Security Threats & Trends

303

Published on

A look at the recent IT security trends and topics affecting the risk, compliance and cyber-security professional

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
303
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
15
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "Tier-3 Huntsman - IT Security Threats & Trends"

  1. 1. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. IT SECURITY: 2014 THREATS & TRENDS
  2. 2. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. The 2014 Global State of Information Security Survey® Key Findings, PWC, September 2013 KEY FINDINGS “DEFENDING YESTERDAY” “While organisations have made significant security improvements, they have not kept pace with today’s determined adversaries. As a result, many rely on yesterday’s security practices to combat today’s threats.” The 2014 Global State of Information Security Survey® Key Findings, PwC, September 2013
  3. 3. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. THE BATTLE FOR PRIVACY REACHED NEW HEIGHTS Large databases still prime hacking targets Governments toughened privacy laws Countries spied on each other Democracies spied on their own people 2013: MAIN EVENTS
  4. 4. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2013: BIG ORGANISATIONS BIG BREACHES TWITTER 250,000 user accounts compromised EVERNOTE 50 million users urged to reset passwords LIVINGSOCIAL 50 million accounts compromised FACEBOOK 6 million user accounts compromised ADOBE 150 million user accounts compromised Adobe breach affects millions of FACEBOOK users
  5. 5. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2013: SPY vs SPY Edward Snowden reveals details of the NSA’s surveillance program NSA taps into networks of Google and Yahoo's data centres Google, Yahoo, Microsoft and Apple invest in 2048-bit encryption to stop the NSA from spying on them & customers NSA spys on private cell phones of European leaders AFP admits monitoring phones of 4 MPs City of London announces removal of smartphone-tracking, WiFi-sniffing garbage bins
  6. 6. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2013: MAJOR TRENDS PERSONALLY IDENTIFIABLE INFORMATION (PII) REMAINED THE BIGGEST TARGET TARGETED STEALTH ATTACKS BECAME COMMONPLACE (VARIANTS OF APTS) ‘WHALING’ EVOLVED - TARGETING USERS WITH HIGH LEVEL ACCESS PRIVILEGES CYBER WARS BETWEEN NATION STATES CONTINUED THE BYOD TREND PROVED UNSTOPPABLE CLOUD COMPUTING BECAME MORE UBIQUITOUS
  7. 7. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2014: MAJOR TRENDS 1.Compliance takes a backseat to Critical Business Risk “Security should move beyond compliance and be aligned with the business —and championed by the CEO and board— to emphasize threat awareness, asset protection, and motives of opponents” PwC 2014 Information Security Survey
  8. 8. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2014: MAJOR TRENDS 2.Critical National Infrastructure moves to the front “The UK will recruit experts in their hundreds ... who will be part of the Joint Cyber Reserve ...to work alongside members of the Ministry of Defence and GCHQ to protect critical infrastructure and prevent data theft.” C/NET UK
  9. 9. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2014: SPECIFIC THREATS Attacks will be more targeted, on: Data in the cloud ‘Keepers of the keys’ Partner networks File sharing services WINDOWS XP's retirement Unpatched MSXML, Java, and Adobe apps
  10. 10. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2014: HOW TO PREPARE I. Assume the enemy is within II. Check your logs for footprints III. Make your IT staff more effective with better tools IV. Review your security controls & policies V. Ensure compliance with revised standards VI. Get real-time intelligence e.g. Behaviour Anomaly Detection VII. Improve security awareness across your organisation
  11. 11. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. Resources IT Security 2014 Threats & Trends – fully-referenced Hot Shot Privacy Protection - Is It Too Late?– Short White paper How to Combat Insider Risk with Huntsman – Application Brief How to Secure the Cloud with Huntsman– Application Brief Follow us Contact us FOR MORE
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×