0
Security Trends and Innovations      Bulent Teksoz      Chief Security Strategist for Emerging Markets            @bteksoz...
Bad News           Good News@bteksoz   Kuwait Info Security Conference – May 2012   2
@bteksoz   Kuwait Info Security Conference – May 2012   3
Targeted Attacks by Sector                                                       Government & Public Sector               ...
@bteksoz   Kuwait Info Security Conference – May 2012   5
@bteksoz   Kuwait Info Security Conference – May 2012   6
Four Key TrendsMalware Targeted                     Mobile      DataAttacks         Attacks              Threats   Breache...
What about Kuwait?@bteksoz        Kuwait Info Security Conference – May 2012   8
@bteksoz   Kuwait Info Security Conference – May 2012   9
@bteksoz   Kuwait Info Security Conference – May 2012   10
@bteksoz   Kuwait Info Security Conference – May 2012   11
What’s Ahead in 2012?                                                 Attackers will                                      ...
The Big QuestionHow secure are we now?  @bteksoz         Kuwait Info Security Conference – May 2012   14
One Dashboard  @bteksoz      Kuwait Info Security Conference – May 2012   15
Summary – What does that mean?• Risk - volume becoming impossible to manage• Acceptance that breaches will occur• Change i...
Thank you!Bulent Teksoz                                                    @bteksozCopyright © 2012 Symantec Corporation. ...
Upcoming SlideShare
Loading in...5
×

Mr. Bulent Teksoz - Security trends and innovations

295

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
295
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  •  
  • ISTR 17 DataSector information …. Gov’t and public sector target is big, but other sectors are being attacked as well Lots of other industries are being targeted – not just gov’t and public sector … Key takeaway? Companies of all sizes and sectors need to be vigilant.
  • There is so much information that is covered in the ISTR 17 that we can’t cover it all in this one discussion. So, we’ve tried to focus on key trends in the ISTR – these are trends that the data spoke to and we thought were worth emphasizingWe’ll look at all of these in more detail over the following slides.
  • So … that’s a quick overview of some of the key trends we saw in the ISTR 17 – there is a lot more information available online at www.symantec.com/threatrerportKey trends we see for 2012?Macs are not immune to malwareThe use of Java for cross-platform attacks was discussed in ISTR 16Targeted attacks will be ongoing and will expandMalware authors will capitalize on co-mingling of work and personal lives on mobile devices As financial transactions move to mobile devices, they will followCloud computing and mobile will force IT to rethink security
  • Big Numbers for 2011: Interesting ups and downsThese are the big numbers from the infographics we looked at earlier … with a bit more explanation. Red and Green Arrows (explanation): Red = going up is a “bad” thing – Green = going down is a “good” thingAlmost doubled # of attacks blocked from 2010 – many of the blocked attacks have shifted from AV signatures to IPS – this is important for customers to know – IPS can 403 million unique variants of malware – very significant growth over 2010.Interesting things – you would have expected vulnerabilities to go up with more attacks, but that’s not the case0-day vulnerabilities dropped – we’ll talk more about that later.there was a big jump in mobile vulnerabilities – it’s still new a platform and being explored by malware authors – we expect to see more increases on that frontSpam has dropped – 34% decrease – dramatic drop – will look at that later
  • Transcript of "Mr. Bulent Teksoz - Security trends and innovations"

    1. 1. Security Trends and Innovations Bulent Teksoz Chief Security Strategist for Emerging Markets @bteksozKuwait Info Security Conference – May 2012
    2. 2. Bad News Good News@bteksoz Kuwait Info Security Conference – May 2012 2
    3. 3. @bteksoz Kuwait Info Security Conference – May 2012 3
    4. 4. Targeted Attacks by Sector Government & Public Sector Manufacturing Finance IT Services Chemical & Pharmaceutical Transport & Utilities Non-Profit Marketing & Media Education Retail @bteksoz Kuwait Info Security Conference – May 2012 4
    5. 5. @bteksoz Kuwait Info Security Conference – May 2012 5
    6. 6. @bteksoz Kuwait Info Security Conference – May 2012 6
    7. 7. Four Key TrendsMalware Targeted Mobile DataAttacks Attacks Threats Breaches Internet Security Threat Expand81% Report, Vol. 17 ↑ Expose All on Rise @bteksoz Kuwait Info Security Conference – May 2012 7
    8. 8. What about Kuwait?@bteksoz Kuwait Info Security Conference – May 2012 8
    9. 9. @bteksoz Kuwait Info Security Conference – May 2012 9
    10. 10. @bteksoz Kuwait Info Security Conference – May 2012 10
    11. 11. @bteksoz Kuwait Info Security Conference – May 2012 11
    12. 12. What’s Ahead in 2012? Attackers will capitalize on work/personal Macs are not info on mobiles immune Cloud computing and mobile will Targeted attacks force IT to rethink will continue security @bteksoz Kuwait Info Security Conference – May 2012 12
    13. 13. The Big QuestionHow secure are we now? @bteksoz Kuwait Info Security Conference – May 2012 14
    14. 14. One Dashboard @bteksoz Kuwait Info Security Conference – May 2012 15
    15. 15. Summary – What does that mean?• Risk - volume becoming impossible to manage• Acceptance that breaches will occur• Change in focus from asset to information• Business demands – consolidate security (Back to basics) – Risk based approach (Information & identity centric) – Security must become a two way street (stop exfiltration of data) – Smarter Intelligence – Centralized correlated timely visibility & activity 16
    16. 16. Thank you!Bulent Teksoz @bteksozCopyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of SymantecCorporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express orimplied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. @bteksoz Kuwait Info Security Conference – May 2012 17
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×