andrew milroy - top security trends and takeaways for 2013


Published on

Andrew Milroy presentation at recent Trend Micro Evolve Security Conference

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

andrew milroy - top security trends and takeaways for 2013

  1. 1. Top Security Trends and Takeaways for 2013March 2013
  2. 2. 2Agenda The Coming Together of Cloud and Mobility IT Embedded Across Industries IT Security Market Evolution Social Media and Consumerisation Cloud and Mobile Threats
  3. 3. 3The Coming Together of Computing and Mobility1970s1960s 1980s 1990s 2000MainframeSupercomputer2010CloudSmart Phones&TabletsPersonalComputerLaptop/NotebookMobilePhone(2G)
  4. 4. 4Mobile Ahead as Means of Connecting to the Internet4Source: Statcounter Global Stats, KPCB
  5. 5. 5Bandwidth RequirementsEmailsInternetbrowsingSocial NetworkingOnlineShoppingP2P FileSharingReal time CommunicationsSmart City InfrastructureTele-medicineConnected CarsTele-educationSmart GridsNext Generation TVM2MApplication/ContentRequirements< 1Mbps 3 - 7 Mbps 100 Mbps - 1 GbpsRich Communications o Increasing demand from consumersfor virtual equivalent communicationand entertainment experiences. Forexample, low latency in high graphicsgaming.o Demand from enterprises (e.g. SMEs)for cost effective productivityapplications such as cloud computing.o Demand from the public sector toincrease administrative efficiency viasmart city infrastructure.NBN: PossibilitiesConvergenceBasicCloud ComputingHigh Speed Networks and Convergence
  6. 6. 6Example: Self-Driving Automobiles• Google has been working on this for four yearsnow.• Automobile manufacturers are alsoresearching including GM, BMW and Audi• February 2012 – Nevada passes first laws inthe USA to allow driverless cars on itshighways.• General Motors predicts the technology willbe standard by 2020.Convergence of different industries? SecurityImplications?
  7. 7. 7‘Virtual’ World Security Issues Massively Impacting‘Physical’ WorldSouth KoreaSteps UpSecurity atNuclear Plants
  8. 8. 81985-1995 1995-2005 2005-2015 2015 OnwardsSource: Frost & Sullivan.Maladvertising,RansonwarePC VirusesSpamInternetVirusesPhishing,Bots,SpywareDDOS,Worms,TrojansSocial Media,Mobile, Cloud,APTs WateringholesImpactCyber-everything,Threat Evolution and Impact
  9. 9. 91,979.42,205.62,448.62,716.73,015.31,413.91,600.51,972.12,390.02,881.9570.6664.3785.4936.31,120.0112.9 140.5 181.0 242.7 313.178.5 103.1 136.9 184.5 254.048.4 70.4 105.7 162.3252.257.8 84.9 121.6 169.1 207.921.9 30.2 51.3 69.5 89.20.0500.01,000.01,500.02,000.02,500.03,000.03,500.02011 2012 2013 2014 2015Network SecurityCAGR (2012-2015):11.0%MSSCAGR (2012-2015):21.7%SCMCAGR (2012-2015):19.0%SIEMCAGR (2012-2015):30.6%WAFCAGR (2012-2015):35.0%Virtualization SecurityCAGR (2012-2015):53.0%DLPCAGR (2012-2015):34.8%Mobile SecurityCAGR (2012-2015):43.5%TotalRevenue(US$Million)Security Market Size and Forecast
  10. 10. 10Social Media is now a Key Part of Customer ExperienceCustomers arediscussing yourproducts/servicesCustomers are sharing experiences onlineSocial Media gives you the ability to listen to customers,even when they are not calling youSocial Media has the power to significantly impact yourbusiness, so ignoring this channel is no longer an option
  11. 11. 11Social Media becomes Preferred Platform for Malware• Social media is becoming themost attractive platform formalware as mobile devicesbecome the most attractivehardware• Young people are often verysusceptible to social mediascams as they are often lesscautious about sharing personalinformation• Spam and phishing is shifting tosocial media platforms
  12. 12. 12PublicDomainPersonalDomainProfessionalDomainWhat the Individual wants: Persona Integration Single Device Mentality Freedom of ChoiceConflict Theatre – The Human FactorWhat the Enterprise wants: Persona Differentiation Visibility into User Behaviors Power of ControlPublicDomainProfessional DomainPersonalDomainSource: Frost & Sullivan
  13. 13. LevelAgreement (SLA)Service OfferingsUptime andReliabilityConcernsSecurity & DataPrivacy ConcernHow would you rate the level of impact that the following factors have in your decisionmaking when it comes to cloud services in general?MeanScoreAPAC End-User Study – Adopting Cloud ServicesN = 210.Source: Frost & Sullivan
  14. 14. 14Mobile Security Revenue Forecast-20.0- 2012 2013 2014 2015Revenue 21.9 30.2 51.3 69.5 89.2Growth Rate 37.9 69.9 35.5 28.3Revenue($Million)Mobile Security Market: Revenue ForecastAPAC, 2012–2015CAGR = 43.5%-GrowthRate(%)Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
  15. 15. 15Android: A Mecca for Malware• OS fragmentation – mobile carriers not pushing updates aggressively enough.Google controlled Nexus 4 is much more secure.• Exposed source code and dominant mobile platform.• Source of malware is often apps e.g, fake Instagram and fake Angry Birds thatsend messages to premium rate SMS services.• Linux based code is familiar territory for many hackers• Will Google and the carriers respond?
  16. 16. 16Conclusions• IT security is now having a profound effect on the „physical world‟.• Embedded IT is massively increasing the potential impact• Cloud, mobile and social are driving new security threats• Cyberespionage and cybersabotage are becoming a reality. – more statesponsored cyber attacks• “Just as nuclear was the strategic warfare of the industrial era, cyber warfarehas become the strategic warfare of the information era” US Secretary ofDefence, Leon Panetta.
  17. 17. 17Thank YouFor further questions and enquiriesAndrew MilroyVice President - ICTFrost & SullivanEmail: andrew.milroy@frost.comTwitter: andy1994