Mr. Khalid Shaikh  - emerging trends in managing it security
Upcoming SlideShare
Loading in...5
×
 

Mr. Khalid Shaikh - emerging trends in managing it security

on

  • 439 views

 

Statistics

Views

Total Views
439
Views on SlideShare
439
Embed Views
0

Actions

Likes
0
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Mr. Khalid Shaikh  - emerging trends in managing it security Mr. Khalid Shaikh - emerging trends in managing it security Presentation Transcript

  • Emerging Trends in ManagingIT SecurityMay 2012Presentation by: Khalid Shaikh – Practice Head forIT Security and Privacy Services
  • Changing Business Needs 1980 2000 2010 and beyond Internet Public Telephone Evolution Transformation Digital Set Top Customers Telephone, Third Telephone, Internet Third Internet Parties & Third Parties Parties & Third Parties Internet Third Internet Router Router Satellite dish Parties Lightpath ` ` Internet Internet Satellite dish Satellite dish Frame Optimum Cable Modem Relay Online Customers Optimum Oracle Online Optimum Untrusted Lightpath Corporate Cable Modem Corporate Cable Modem Customers Online Backbone Customers Backbone Customers Backbone Other Businesses and/or New Businesses Voice Voice Network Satellite dish Network Satellite dish Router Router Cable Frame Internet Relay Terminal Server PBX PBX Rainbow Media Lightpath Lightpath Digital Digital Set Top Set Top Customers Internet Employees & Customers Customers Third Parties Lightpath Public Satellite dish Lightpath Public Customers Telephone Customers Telephone2 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Emerging Technologies3 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Trends in IT Security Attack TREND 1 : Industrial Threats TREND 2 : Threats Within: Embedded Hardware TREND 3 : Hacktivism TREND 4 : Web Threats…. TREND 5 : Mobile Threats4 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Recent Events5 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Motives of Attack • Industrial Espionage • Financial • Military • Ideological • Politics • Prestige6 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Attack Tools are Freely Available7 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Security Never Sleeps • Increasing sophistications of attacks • Protect data and information • Keeping up-to-date with security incidents and solutions • Keeping the IT infrastructure in compliance with the IT Security Policy of the organization • Keeping up-to-date with the changes to legal and regulatory requirements • Reacting effectively and timely to security violations • Effectively managing threats to data security • Complexity of managing a broad portfolio of security tools/solutions • Mobile clients and unmanaged devices • Periodically conducting security awareness trainings to users within the organization8 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Holistic Approach in Managing IT Security Information Security Vision and Strategy Business Initiatives Threats Senior Management Commitment Best/Acceptable Practice Training and Awareness Enterprise Architecture Legislation Strategy Vulnerability & Risk Assessment Security Policy Security Architecture and Technical Standards Administrative and End-User Guidelines, Practices and Procedures Enforcement Monitoring Recovery Process Process Process Information Security Management9 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Holistic Approach in Managing IT Security10 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • Prediction – Persistence – Patience - Preparedness11 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • If You Have Further Questions: Please visit us at Booth Number 8 and 9. Khalid Shaikh Phone: (965) – 66225122 Senior Manager – Technology khalid.shaikh@protivitiglobal.com.kw Risk Services Powerful Insights. Proven Delivery.™12 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 13 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference