SlideShare a Scribd company logo
1 of 10
TOP 5 SECURITY PREDICTIONS
2016 FOR EMEA
Jens Christian Høy Monrad
Global Intelligence Liaison - EMEA
FireEye
/ EMEA Executive Perspective
1. Leadership Cyber Security Consciousness
2. Governments Investment
3. EU Data Privacy & Protection
4. Legitimate analytic tools misuse
5. Digital transformation challenges
1 / Boards get onboard
 Leadership become cyber security
conscious
 Boardrooms will review their cyber
security strategy
2 / Governments will be challenged
 Europe´s governments will devote
more resources to boost capabilities
to tackle cyber threats
 Investment in training for the next
generation of cyber security
professionals is a must
3 / EU Data Privacy & Protection
 EU General Data Protection Regulations
 Legal obligations and reporting requirements
 Harmonised enforcement
4 / Increased usage of legitimate tools in cyber attacks
 Advanced groups will camouflage their activities
amongst legitimate web traffic
 Legitimate analytics tools and apps will be exploited
5 / Digitalisation will leave security behind
 Increased digitalisation and e-gov infrastructure
- pace of growth will potentially grow faster than security
 Potential lack of data classification will
complicate investigations and extend time
between discovery and recovery from breaches.
/ Wait! There Is More To Expect
1. Disruption leads to losses
2. ICS - Infrastructures weak link
3. The Internet of Things broadens the attack surface
4. New Payment Systems, new Threats
5. Apple in the crosshairs
TECHNOLOGY
IDENTIFY KNOWN, UNKNOWN, AND NON MALWARE
BASED THREATS
INTEGRATED PROTECTION ACROSS ALL MAJOR
ATTACK VECTORS
INVESTIGATION TOOLS TO SPEED RESPONSE
EXPERTISE
TRAINED SECURITY INCIDENT RESPONDERS
EXPERIENCE WITH ADVANCED ATTACKERS
UNDERSTAND THE BUSINESS IMPLICATIONS
INTELLIGENCE
FRONT LINE INTEL FROM INCIDENT FORENSICS
NETWORK & ENDPOINT SENSORS
MALWARE INTEL
THREAT ACTOR PROFILES
LOCAL INTEL ON ENCOUNTERED THREATS
/ Adaptive Defense for a changing world
YOU MIGHT ALSO LIKE…
REPORT:
Looking Forward:
The 2016 Security Landscape in EMEA
Click to Download the Special Report >

More Related Content

Viewers also liked

Viewers also liked (10)

The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigation
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Securing your Rails application
Securing your Rails applicationSecuring your Rails application
Securing your Rails application
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 

More from FireEye, Inc.

More from FireEye, Inc. (11)

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

FireEye EMEA Security Predictions 2016

  • 1. TOP 5 SECURITY PREDICTIONS 2016 FOR EMEA Jens Christian Høy Monrad Global Intelligence Liaison - EMEA FireEye
  • 2. / EMEA Executive Perspective 1. Leadership Cyber Security Consciousness 2. Governments Investment 3. EU Data Privacy & Protection 4. Legitimate analytic tools misuse 5. Digital transformation challenges
  • 3. 1 / Boards get onboard  Leadership become cyber security conscious  Boardrooms will review their cyber security strategy
  • 4. 2 / Governments will be challenged  Europe´s governments will devote more resources to boost capabilities to tackle cyber threats  Investment in training for the next generation of cyber security professionals is a must
  • 5. 3 / EU Data Privacy & Protection  EU General Data Protection Regulations  Legal obligations and reporting requirements  Harmonised enforcement
  • 6. 4 / Increased usage of legitimate tools in cyber attacks  Advanced groups will camouflage their activities amongst legitimate web traffic  Legitimate analytics tools and apps will be exploited
  • 7. 5 / Digitalisation will leave security behind  Increased digitalisation and e-gov infrastructure - pace of growth will potentially grow faster than security  Potential lack of data classification will complicate investigations and extend time between discovery and recovery from breaches.
  • 8. / Wait! There Is More To Expect 1. Disruption leads to losses 2. ICS - Infrastructures weak link 3. The Internet of Things broadens the attack surface 4. New Payment Systems, new Threats 5. Apple in the crosshairs
  • 9. TECHNOLOGY IDENTIFY KNOWN, UNKNOWN, AND NON MALWARE BASED THREATS INTEGRATED PROTECTION ACROSS ALL MAJOR ATTACK VECTORS INVESTIGATION TOOLS TO SPEED RESPONSE EXPERTISE TRAINED SECURITY INCIDENT RESPONDERS EXPERIENCE WITH ADVANCED ATTACKERS UNDERSTAND THE BUSINESS IMPLICATIONS INTELLIGENCE FRONT LINE INTEL FROM INCIDENT FORENSICS NETWORK & ENDPOINT SENSORS MALWARE INTEL THREAT ACTOR PROFILES LOCAL INTEL ON ENCOUNTERED THREATS / Adaptive Defense for a changing world
  • 10. YOU MIGHT ALSO LIKE… REPORT: Looking Forward: The 2016 Security Landscape in EMEA Click to Download the Special Report >