Your SlideShare is downloading. ×
andrew milroy - top security trends and takeaways for 2013
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

andrew milroy - top security trends and takeaways for 2013

269
views

Published on

Andrew Milroy presentation at recent Trend Micro Evolve Security Conference

Andrew Milroy presentation at recent Trend Micro Evolve Security Conference

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
269
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Top Security Trends and Takeaways for 2013March 2013
  • 2. 2Agenda The Coming Together of Cloud and Mobility IT Embedded Across Industries IT Security Market Evolution Social Media and Consumerisation Cloud and Mobile Threats
  • 3. 3The Coming Together of Computing and Mobility1970s1960s 1980s 1990s 2000MainframeSupercomputer2010CloudSmart Phones&TabletsPersonalComputerLaptop/NotebookMobilePhone(2G)
  • 4. 4Mobile Ahead as Means of Connecting to the Internet4Source: Statcounter Global Stats, KPCB
  • 5. 5Bandwidth RequirementsEmailsInternetbrowsingSocial NetworkingOnlineShoppingP2P FileSharingReal time CommunicationsSmart City InfrastructureTele-medicineConnected CarsTele-educationSmart GridsNext Generation TVM2MApplication/ContentRequirements< 1Mbps 3 - 7 Mbps 100 Mbps - 1 GbpsRich Communications o Increasing demand from consumersfor virtual equivalent communicationand entertainment experiences. Forexample, low latency in high graphicsgaming.o Demand from enterprises (e.g. SMEs)for cost effective productivityapplications such as cloud computing.o Demand from the public sector toincrease administrative efficiency viasmart city infrastructure.NBN: PossibilitiesConvergenceBasicCloud ComputingHigh Speed Networks and Convergence
  • 6. 6Example: Self-Driving Automobiles• Google has been working on this for four yearsnow.• Automobile manufacturers are alsoresearching including GM, BMW and Audi• February 2012 – Nevada passes first laws inthe USA to allow driverless cars on itshighways.• General Motors predicts the technology willbe standard by 2020.Convergence of different industries? SecurityImplications?
  • 7. 7‘Virtual’ World Security Issues Massively Impacting‘Physical’ WorldSouth KoreaSteps UpSecurity atNuclear Plants
  • 8. 81985-1995 1995-2005 2005-2015 2015 OnwardsSource: Frost & Sullivan.Maladvertising,RansonwarePC VirusesSpamInternetVirusesPhishing,Bots,SpywareDDOS,Worms,TrojansSocial Media,Mobile, Cloud,APTs WateringholesImpactCyber-everything,Threat Evolution and Impact
  • 9. 91,979.42,205.62,448.62,716.73,015.31,413.91,600.51,972.12,390.02,881.9570.6664.3785.4936.31,120.0112.9 140.5 181.0 242.7 313.178.5 103.1 136.9 184.5 254.048.4 70.4 105.7 162.3252.257.8 84.9 121.6 169.1 207.921.9 30.2 51.3 69.5 89.20.0500.01,000.01,500.02,000.02,500.03,000.03,500.02011 2012 2013 2014 2015Network SecurityCAGR (2012-2015):11.0%MSSCAGR (2012-2015):21.7%SCMCAGR (2012-2015):19.0%SIEMCAGR (2012-2015):30.6%WAFCAGR (2012-2015):35.0%Virtualization SecurityCAGR (2012-2015):53.0%DLPCAGR (2012-2015):34.8%Mobile SecurityCAGR (2012-2015):43.5%TotalRevenue(US$Million)Security Market Size and Forecast
  • 10. 10Social Media is now a Key Part of Customer ExperienceCustomers arediscussing yourproducts/servicesCustomers are sharing experiences onlineSocial Media gives you the ability to listen to customers,even when they are not calling youSocial Media has the power to significantly impact yourbusiness, so ignoring this channel is no longer an option
  • 11. 11Social Media becomes Preferred Platform for Malware• Social media is becoming themost attractive platform formalware as mobile devicesbecome the most attractivehardware• Young people are often verysusceptible to social mediascams as they are often lesscautious about sharing personalinformation• Spam and phishing is shifting tosocial media platforms
  • 12. 12PublicDomainPersonalDomainProfessionalDomainWhat the Individual wants: Persona Integration Single Device Mentality Freedom of ChoiceConflict Theatre – The Human FactorWhat the Enterprise wants: Persona Differentiation Visibility into User Behaviors Power of ControlPublicDomainProfessional DomainPersonalDomainSource: Frost & Sullivan
  • 13. 133.63.83.84.14.22.03.04.05.0CostService LevelAgreement (SLA)Service OfferingsUptime andReliabilityConcernsSecurity & DataPrivacy ConcernHow would you rate the level of impact that the following factors have in your decisionmaking when it comes to cloud services in general?MeanScoreAPAC End-User Study – Adopting Cloud ServicesN = 210.Source: Frost & Sullivan
  • 14. 14Mobile Security Revenue Forecast-20.0-10.00.010.020.030.040.050.060.070.080.00.010.020.030.040.050.060.070.080.090.0100.02011 2012 2013 2014 2015Revenue 21.9 30.2 51.3 69.5 89.2Growth Rate 37.9 69.9 35.5 28.3Revenue($Million)Mobile Security Market: Revenue ForecastAPAC, 2012–2015CAGR = 43.5%-GrowthRate(%)Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
  • 15. 15Android: A Mecca for Malware• OS fragmentation – mobile carriers not pushing updates aggressively enough.Google controlled Nexus 4 is much more secure.• Exposed source code and dominant mobile platform.• Source of malware is often apps e.g, fake Instagram and fake Angry Birds thatsend messages to premium rate SMS services.• Linux based code is familiar territory for many hackers• Will Google and the carriers respond?
  • 16. 16Conclusions• IT security is now having a profound effect on the „physical world‟.• Embedded IT is massively increasing the potential impact• Cloud, mobile and social are driving new security threats• Cyberespionage and cybersabotage are becoming a reality. – more statesponsored cyber attacks• “Just as nuclear was the strategic warfare of the industrial era, cyber warfarehas become the strategic warfare of the information era” US Secretary ofDefence, Leon Panetta.
  • 17. 17Thank YouFor further questions and enquiriesAndrew MilroyVice President - ICTFrost & SullivanEmail: andrew.milroy@frost.comTwitter: andy1994