Successfully reported this slideshow.
Security Trends and Innovations      Bulent Teksoz      Chief Security Strategist for Emerging Markets            @bteksoz...
Bad News           Good News@bteksoz   Kuwait Info Security Conference – May 2012   2
@bteksoz   Kuwait Info Security Conference – May 2012   3
Targeted Attacks by Sector                                                       Government & Public Sector               ...
@bteksoz   Kuwait Info Security Conference – May 2012   5
@bteksoz   Kuwait Info Security Conference – May 2012   6
Four Key TrendsMalware Targeted                     Mobile      DataAttacks         Attacks              Threats   Breache...
What about Kuwait?@bteksoz        Kuwait Info Security Conference – May 2012   8
@bteksoz   Kuwait Info Security Conference – May 2012   9
@bteksoz   Kuwait Info Security Conference – May 2012   10
@bteksoz   Kuwait Info Security Conference – May 2012   11
What’s Ahead in 2012?                                                 Attackers will                                      ...
The Big QuestionHow secure are we now?  @bteksoz         Kuwait Info Security Conference – May 2012   14
One Dashboard  @bteksoz      Kuwait Info Security Conference – May 2012   15
Summary – What does that mean?• Risk - volume becoming impossible to manage• Acceptance that breaches will occur• Change i...
Thank you!Bulent Teksoz                                                    @bteksozCopyright © 2012 Symantec Corporation. ...
Upcoming SlideShare
Loading in …5
×

Mr. Bulent Teksoz - Security trends and innovations

582 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Mr. Bulent Teksoz - Security trends and innovations

  1. 1. Security Trends and Innovations Bulent Teksoz Chief Security Strategist for Emerging Markets @bteksozKuwait Info Security Conference – May 2012
  2. 2. Bad News Good News@bteksoz Kuwait Info Security Conference – May 2012 2
  3. 3. @bteksoz Kuwait Info Security Conference – May 2012 3
  4. 4. Targeted Attacks by Sector Government & Public Sector Manufacturing Finance IT Services Chemical & Pharmaceutical Transport & Utilities Non-Profit Marketing & Media Education Retail @bteksoz Kuwait Info Security Conference – May 2012 4
  5. 5. @bteksoz Kuwait Info Security Conference – May 2012 5
  6. 6. @bteksoz Kuwait Info Security Conference – May 2012 6
  7. 7. Four Key TrendsMalware Targeted Mobile DataAttacks Attacks Threats Breaches Internet Security Threat Expand81% Report, Vol. 17 ↑ Expose All on Rise @bteksoz Kuwait Info Security Conference – May 2012 7
  8. 8. What about Kuwait?@bteksoz Kuwait Info Security Conference – May 2012 8
  9. 9. @bteksoz Kuwait Info Security Conference – May 2012 9
  10. 10. @bteksoz Kuwait Info Security Conference – May 2012 10
  11. 11. @bteksoz Kuwait Info Security Conference – May 2012 11
  12. 12. What’s Ahead in 2012? Attackers will capitalize on work/personal Macs are not info on mobiles immune Cloud computing and mobile will Targeted attacks force IT to rethink will continue security @bteksoz Kuwait Info Security Conference – May 2012 12
  13. 13. The Big QuestionHow secure are we now? @bteksoz Kuwait Info Security Conference – May 2012 14
  14. 14. One Dashboard @bteksoz Kuwait Info Security Conference – May 2012 15
  15. 15. Summary – What does that mean?• Risk - volume becoming impossible to manage• Acceptance that breaches will occur• Change in focus from asset to information• Business demands – consolidate security (Back to basics) – Risk based approach (Information & identity centric) – Security must become a two way street (stop exfiltration of data) – Smarter Intelligence – Centralized correlated timely visibility & activity 16
  16. 16. Thank you!Bulent Teksoz @bteksozCopyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of SymantecCorporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express orimplied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. @bteksoz Kuwait Info Security Conference – May 2012 17

×