Top Security Trends and Takeaways for 2013March 2013
2Agenda The Coming Together of Cloud and Mobility IT Embedded Across Industries IT Security Market Evolution Social Media and Consumerisation Cloud and Mobile Threats
3The Coming Together of Computing and Mobility1970s1960s 1980s 1990s 2000MainframeSupercomputer2010CloudSmart Phones&TabletsPersonalComputerLaptop/NotebookMobilePhone(2G)
4Mobile Ahead as Means of Connecting to the Internet4Source: Statcounter Global Stats, KPCB
5Bandwidth RequirementsEmailsInternetbrowsingSocial NetworkingOnlineShoppingP2P FileSharingReal time CommunicationsSmart City InfrastructureTele-medicineConnected CarsTele-educationSmart GridsNext Generation TVM2MApplication/ContentRequirements< 1Mbps 3 - 7 Mbps 100 Mbps - 1 GbpsRich Communications o Increasing demand from consumersfor virtual equivalent communicationand entertainment experiences. Forexample, low latency in high graphicsgaming.o Demand from enterprises (e.g. SMEs)for cost effective productivityapplications such as cloud computing.o Demand from the public sector toincrease administrative efficiency viasmart city infrastructure.NBN: PossibilitiesConvergenceBasicCloud ComputingHigh Speed Networks and Convergence
6Example: Self-Driving Automobiles• Google has been working on this for four yearsnow.• Automobile manufacturers are alsoresearching including GM, BMW and Audi• February 2012 – Nevada passes first laws inthe USA to allow driverless cars on itshighways.• General Motors predicts the technology willbe standard by 2020.Convergence of different industries? SecurityImplications?
10Social Media is now a Key Part of Customer ExperienceCustomers arediscussing yourproducts/servicesCustomers are sharing experiences onlineSocial Media gives you the ability to listen to customers,even when they are not calling youSocial Media has the power to significantly impact yourbusiness, so ignoring this channel is no longer an option
11Social Media becomes Preferred Platform for Malware• Social media is becoming themost attractive platform formalware as mobile devicesbecome the most attractivehardware• Young people are often verysusceptible to social mediascams as they are often lesscautious about sharing personalinformation• Spam and phishing is shifting tosocial media platforms
12PublicDomainPersonalDomainProfessionalDomainWhat the Individual wants: Persona Integration Single Device Mentality Freedom of ChoiceConflict Theatre – The Human FactorWhat the Enterprise wants: Persona Differentiation Visibility into User Behaviors Power of ControlPublicDomainProfessional DomainPersonalDomainSource: Frost & Sullivan
18.104.22.168.14.22.03.04.05.0CostService LevelAgreement (SLA)Service OfferingsUptime andReliabilityConcernsSecurity & DataPrivacy ConcernHow would you rate the level of impact that the following factors have in your decisionmaking when it comes to cloud services in general?MeanScoreAPAC End-User Study – Adopting Cloud ServicesN = 210.Source: Frost & Sullivan
14Mobile Security Revenue Forecast-20.0-10.00.010.020.030.040.050.060.070.080.00.010.020.030.040.050.060.070.080.090.0100.02011 2012 2013 2014 2015Revenue 21.9 30.2 51.3 69.5 89.2Growth Rate 37.9 69.9 35.5 28.3Revenue($Million)Mobile Security Market: Revenue ForecastAPAC, 2012–2015CAGR = 43.5%-GrowthRate(%)Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
15Android: A Mecca for Malware• OS fragmentation – mobile carriers not pushing updates aggressively enough.Google controlled Nexus 4 is much more secure.• Exposed source code and dominant mobile platform.• Source of malware is often apps e.g, fake Instagram and fake Angry Birds thatsend messages to premium rate SMS services.• Linux based code is familiar territory for many hackers• Will Google and the carriers respond?
16Conclusions• IT security is now having a profound effect on the „physical world‟.• Embedded IT is massively increasing the potential impact• Cloud, mobile and social are driving new security threats• Cyberespionage and cybersabotage are becoming a reality. – more statesponsored cyber attacks• “Just as nuclear was the strategic warfare of the industrial era, cyber warfarehas become the strategic warfare of the information era” US Secretary ofDefence, Leon Panetta.
17Thank YouFor further questions and enquiriesAndrew MilroyVice President - ICTFrost & SullivanEmail: email@example.comTwitter: andy1994