Your SlideShare is downloading. ×
0
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Verizon 2014 data breach investigations report   dbir - my view ext
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Verizon 2014 data breach investigations report dbir - my view ext

322

Published on

I agree when Verizon's Baker says "the bad news from this year's report is that the cybercriminals and other attackers are getting better at what they do, while the security community is not improving …

I agree when Verizon's Baker says "the bad news from this year's report is that the cybercriminals and other attackers are getting better at what they do, while the security community is not improving its game quickly enough to keep pace."
The bad news, as Wade Baker, principal author of the Data Breach Investigations Report (DBIR) series, says is that: "After analyzing 10 years of data, we realize most organizations cannot keep up with cybercrime – and the bad guys are winning."
My view is that that we are now more concerned about attackers that are targeting our data flow, including data in memory since the DBIR reported that "RAM scrapers" went from a low #17 in 2012 and shoot up the charts to a very concerning #4 spot in 2013.
My view is that that we are now less concerned about attackers that are targeting our stored data since the DBIR reported that "Capture stored data" went from a #4 in 2012 and to a less concerning #9 spot in 2013 and "Privilege abuse" went from a #14 in 2012 and to a less concerning #17 spot in 2013.
I think that file encryption will not stop the bad guys. The bad guys are no longer attacking stored data. The bad guys are now attacking the data flow, including data in memory.
My view is that we now need to secure the data flow, including data in memory. The bad guys are no longer attacking stored data.
I'm increasingly concerned about Big Data and Cloud platforms, great targets for attackers.
An important development was the addition of coarse-grained volume or file encryption will only solve one problem, protecting data at rest, but considering one of the primary goals is using the data, one might suggest that it provided little in the grand scheme of Data security. Sensitive data in use for analytics, traveling between nodes, sent to other systems, or even just being viewed is subject to full exposure.
What they're seeking is advanced functionality equal to the task of balancing security and regulatory compliance with data insights and data utility. This balance is critical for Big Data and Cloud platforms.
Emerging Big Data and Cloud platforms are presenting new use cases that are requiring data insight for analytics, high performance and scalability for Big Data platforms cannot be achieved by old security approaches. New security approaches are required since Big Data is based on a new and different architecture.
Big Data is introducing a new approach to collecting data by allowing unstructured data to be blindly collected. In many cases we do not even know about all sensitive and regulated data fields that are contained in these large data feeds. Analysis of the content is often deferred to a later point in the process, to a stage when we are starting to use the data for analytics. Then it is too late to go back and try to apply data security and compliance to regulations.
My view is that we now need to secure the data flow. The bad guys are no longer attacking stored data in files.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
322
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The Bad Guys are Winning
  • 2. Wade Baker, principal author of the Data Breach Investigations Report (DBIR) series, says is that: “After analyzing 10 years of data, we realize most organizations cannot keep up with cybercrime – and the bad guys are winning.” "Attackers are getting quicker at compromising systems over the past 10 years," "Less than 25 percent of good guys discovered these incidents in days or less. This is not a good situation ... The bad guys are winning at a faster rate than the good guys are winning."
  • 3. The Bad Guys are Attacking Your Data
  • 4. Ram scraper [mal] 223 "RAM scrapers" went from a low #17 in 2012 and shoot up the charts to a very concerning #4 spot in 2013. Verizon’s 2014 Data Breach Investigations Report
  • 5. Export data [mal] 327 “Export data" went from a low #7 in 2012 and shoot up the charts to a very concerning #2 spot in 2013. Verizon’s 2014 Data Breach Investigations Report
  • 6. Capture stored data [mal] 133 “Stored data" went from a #4 in 2012 and to a less concerning #9 spot in 2013 Verizon’s 2014 Data Breach Investigations Report
  • 7. Privillege abuse [mis] 65 "Privilege abuse" went from a #14 in 2012 and to a less concerning #17 spot in 2013 Verizon’s 2014 Data Breach Investigations Report
  • 8. Capture stored data [mal] 133 My Conclusion: File Encryption is Not Helping Verizon’s 2014 Data Breach Investigations Report File encryption
  • 9. Privillege abuse [mis] 65 My Conclusion: Database Monitoring will Not Help Verizon’s 2014 Data Breach Investigations Report Database Activity Monitoring
  • 10. Ram scraper [mal] 223 Export data [mal] 327 My Conclusion: Secure The Sensitive Data Flow Verizon’s 2014 Data Breach Investigations Report Data Tokenization Data Tokenization
  • 11. Attacking Emerging Platforms
  • 12. Cloud and Big Data Emerging Big Data and Cloud platforms are presenting new use cases that are requiring data insight for analytics, high performance and scalability for Big Data platforms cannot be achieved by old security approaches. An important development was the addition of coarse-grained volume or file encryption will only solve one problem, protecting data at rest, but considering one of the primary goals is using the data, one might suggest that it provided little in the grand scheme of Data security. Sensitive data in use for analytics, traveling between nodes, sent to other systems, or even just being viewed is subject to full exposure. What they’re seeking is advanced functionality equal to the task of balancing security and regulatory compliance with data insights and data utility. This balance is critical for Big Data and Cloud platforms.
  • 13. Big Data Big Data is introducing a new approach to collecting data by allowing unstructured data to be blindly collected. In many cases we do not even know about all sensitive and regulated data fields that are contained in these large data feeds. Analysis of the content is often deferred to a later point in the process, to a stage when we are starting to use the data for analytics. New security approaches are required since Big Data is based on a new and different architecture. Then it is too late to go back and try to apply data security and compliance to regulations.
  • 14. Conclusion My view is that that we are now more concerned about attackers that are targeting our data flow. My view is that that we are now less concerned about attackers that are targeting our stored data. I think that file encryption will not stop the bad guys. I found some good news in an interesting report from the Aberdeen Group that revealed that "Over 12 months, data tokenization users had 50% fewer security- related incidents (e.g., unauthorized access, data loss or data exposure than tokenization non-users". Nearly half of the respondents (47%) are currently using tokenization for something other than cardholder data. The name of the study is "Tokenization Gets Traction".

×