CA Technology Forum 2016 presentation - The Future of Cybersecurity_Scott Spiker

207 views

Published on

CA Technology Forum 2016 presentation -
The Future of Cybersecurity
by Scott Spiker

Published in: Government & Nonprofit
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
207
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

CA Technology Forum 2016 presentation - The Future of Cybersecurity_Scott Spiker

  1. 1. © 2016 Unisys Corporation. All rights reserved. 2 NO LOCALE, INDUSTRY, OR ORGANIZATION IS BULLETPROOF WHEN IT COMES TO COMPROMISE OF DATA ~VERIZON DATA BREACH INVESTICATIONS REPORT
  2. 2. © 2016 Unisys Corporation. All rights reserved. 3 Consider Hetch Hetchy
  3. 3. © 2016 Unisys Corporation. All rights reserved. 4 Drinking water for 2.6 million commercial, residential, and industrial customers per day Provides 1.7 billion KwH per year
  4. 4. © 2016 Unisys Corporation. All rights reserved. 5 The outline prepared by the creative team of an advertising agency for the launching of an advertising campaign or message. The creative strategy generally explains how the advertising campaign will meet the advertising objectives of the business. Title here But not without controversy…
  5. 5. © 2016 Unisys Corporation. All rights reserved. 6 From Harmless…
  6. 6. © 2016 Unisys Corporation. All rights reserved. 7 The outline prepared by the creative team of an advertising agency for the launching of an advertising campaign or message. The creative strategy generally explains how the advertising campaign will meet the advertising objectives of the business. Title here …to Potentially Catastrophic.
  7. 7. © 2016 Unisys Corporation. All rights reserved. 8 The outline prepared by the creative team of an advertising agency for the launching of an advertising campaign or message. The creative strategy generally explains how the advertising campaign will meet the advertising objectives of the business. Title here Precedent has been set
  8. 8. © 2016 Unisys Corporation. All rights reserved. 9 The outline prepared by the creative team of an advertising agency for the launching of an advertising campaign or message. The creative strategy generally explains how the advertising campaign will meet the advertising objectives of the business. Title here Hacker used “Google-dorking”
  9. 9. © 2016 Unisys Corporation. All rights reserved. 10 THE FACE OF HACKING HAS CHANGED • Meet Commander X • Responsible for 2010 disruption of Santa Cruz County website • Also aided in Arab Spring, Occupy Wall Street and Orlando city website disruption
  10. 10. © 2016 Unisys Corporation. All rights reserved. 11 • Emotionally Charged • Aging Infrastructure • Elevated Profile • Technology Enabled Attacker Anatomy of a Hacktivist Target
  11. 11. © 2016 Unisys Corporation. All rights reserved. 12 ~VERIZON DATA BREACH INVESTICATIONS REPORT 5 Seismic Shifts In Cybersecurity
  12. 12. © 2016 Unisys Corporation. All rights reserved. 13 1Killing the Password: Access Shifts This option has a triangle on the upper left. Throughout the design, we use subtle color shifts to add visual interest and convey forward momentum. TITLE HERE
  13. 13. © 2016 Unisys Corporation. All rights reserved. 14 25%USERS WHO WOULD SELL THEIR ENTERPRISE USERNAME AND PASSWORD ~SAILPOINT MARKETPULSE SURVEY
  14. 14. © 2016 Unisys Corporation. All rights reserved. 15 Biometrics help but are not foolproof
  15. 15. © 2016 Unisys Corporation. All rights reserved. 16 2Big Data, Analytics, and AI, Oh My! This option has a triangle on the upper left. Throughout the design, we use subtle color shifts to add visual interest and convey forward momentum. TITLE HERE
  16. 16. © 2016 Unisys Corporation. All rights reserved. 17 84% FASTER DETECTION & RESPONSE Less than 24 hours to compromise a network But is detected less than 24 hours only 25%~VERIZON DATA BREACH INVESTICATIONS REPORT
  17. 17. © 2016 Unisys Corporation. All rights reserved. 18 Entrepreneurial activities differ substantially depending on the type of T I T L E H E R E Entrepreneurial activities differ substantially depending on the type of T I T L E H E R E 3Reaching Across The Table: The Importance of Partnerships
  18. 18. © 2016 Unisys Corporation. All rights reserved. 19 ATTACKERS EXPLOIT INCONSISTENT SECURITY POLICIES...THAT HAVE RESULTED IN SYSTEMS THAT ARE DIFFICULT TO ADMINISTER AND DEFEND ~MICROSOFT CYBERSPACE 2025
  19. 19. © 2016 Unisys Corporation. All rights reserved. 20 4 House to Hotel: Rethinking Perimeter Security
  20. 20. © 2016 Unisys Corporation. All rights reserved. 21 30% PHISHING/”WHALING” Phishing messages were opened by the target Those that went on to click the link 12%~VERIZON DATA BREACH INVESTICATIONS REPORT
  21. 21. © 2016 Unisys Corporation. All rights reserved. 22 IN AN OPEN, INTERNAL NETWORK ALL IT TAKES IS ONE ~VERIZON DATA BREACH INVESTIGATIONS REPORT
  22. 22. © 2016 Unisys Corporation. All rights reserved. 23 5Cyber Workforce Development
  23. 23. © 2016 Unisys Corporation. All rights reserved. 24 28% OF ORGANIZATIONS CLAIMED TO HAVE A PROBLEMATIC SHORTAGE OF CYBERSECURITY SKILLS ~ESG BRIEF - CYBERSECURITY SKILLS SHORTAGE
  24. 24. © 2016 Unisys Corporation. All rights reserved. 25 Resource List www.unisyssecurity.com Blogs/Websites: www.Krebsonsecurity.com www.darkreading.com www.threatpost.com http://drericcole.blogspot.com/ https://cloudsecurityalliance.org/ https://twofactorauth.org/ Deeper Learning: Verizon Data Breach Investigation Report - http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ AT&T Decoding the Adversary - https://www.business.att.com/content/src/csi/decodingtheadversary.pdf Symantec Internet Security Threat Report - https://www.symantec.com/security-center/threat-report Cisco Security Report - http://www.cisco.com/c/en/us/products/security/annual_security_report.html HP IoT Security Report - http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA5-4759ENW.pdf Books Documentaries
  25. 25. © 2016 Unisys Corporation. All rights reserved. 26 Remember Hetch Hetchy
  26. 26. © 2016 Unisys Corporation. All rights reserved. 27 THANK YOU Scott Spiker Email: scott.spiker@unisys.com @scottspiker /scottspiker

×