SlideShare a Scribd company logo
1 of 13
Emerging Trends in Managing
IT Security

May 2012

Presentation by: Khalid Shaikh ā€“ Practice Head for
IT Security and Privacy Services
Changing Business Needs
                                          1980                                                                                                         2000                                                                                                       2010 and beyond

                                                                                                                                                              Internet                                                                                                                                                   Public
                                                                                                                                                                                                                                                                                                                       Telephone


                                                                                              Evolution                                                                                                                Transformation                                              Digital
                                                                                                                                                                                                                                                                                  Set Top
                                                                                                                                                                                                                                                                                 Customers
                                                                Telephone,                                                       Third                                                    Telephone, Internet
                Third
                                                                  Internet                                                      Parties                                                     & Third Parties
               Parties
                                                               & Third Parties


    Internet                                                                                               Third    Internet                  Router
                           Router                                                                                                                                                                                                                            Satellite dish
                                                                                                          Parties
                                                                                                                                                                                                                                                                                                                           Lightpath
                                                           `                                                                                                                        `
                                                                                   Internet                                                                                                                       Internet
                                                                                                                                   Satellite dish
                 Satellite dish       Frame               Optimum                                                                                                                                                                           Cable Modem
                                      Relay                Online                                                                                                                                                                            Customers
                                                                                                                                                                                        Optimum
                           Oracle                                                                                                                                                        Online
                                                                                                                                                                                                                                                                       Optimum         Untrusted                               Lightpath
                                          Corporate                              Cable Modem                                                                   Corporate                                        Cable Modem                                                                                                    Customers
                                                                                                                                                                                                                                                                        Online
                                          Backbone                                Customers                                                                    Backbone                                          Customers                                                             Backbone    Other Businesses
                                                                                                                                                                                                                                                                                                        and/or
                                                                                                                                                                                                                                                                                                   New Businesses
                                                 Voice                                                                                                                    Voice
                                                Network    Satellite dish                                                                                                Network          Satellite dish
                           Router                                                                                                             Router
                                                                                                                               Cable                                                                                                                                                                                          Frame
                                                                                                                                                                                                                                                  Internet                                                                    Relay
                                                                                                                                  Terminal Server
                                  PBX                                                                                                                  PBX                    Rainbow Media
                                        Lightpath                                                                                                            Lightpath
       Digital                                                                                                          Digital
      Set Top                                                                                                          Set Top
                                                                                                                      Customers                                                                                                  Internet   Employees &
     Customers                                                                                                                                                                                                                  Customers   Third Parties



               Lightpath              Public                                                                                                                                                                                                                                                              Satellite dish
                                                                                                                                Lightpath                 Public
               Customers            Telephone                                                                                   Customers               Telephone




2    Ā© 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
Emerging Technologies




3   Ā© 2012 Protiviti Member Firm Kuwait W.L.L
    PUBLIC: 4th Kuwait Info Security Conference
Trends in IT Security Attack

    TREND 1 : Industrial Threats

    TREND 2 : Threats Within: Embedded Hardware

    TREND 3 : Hacktivism

    TREND 4 : Web Threatsā€¦.

    TREND 5 : Mobile Threats




4    Ā© 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
Recent Events




5   Ā© 2012 Protiviti Member Firm Kuwait W.L.L
    PUBLIC: 4th Kuwait Info Security Conference
Motives of Attack

    ā€¢    Industrial Espionage
    ā€¢    Financial
    ā€¢    Military
    ā€¢    Ideological
    ā€¢    Politics
    ā€¢    Prestige




6       Ā© 2012 Protiviti Member Firm Kuwait W.L.L
        PUBLIC: 4th Kuwait Info Security Conference
Attack Tools are Freely Available




7    Ā© 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
Security Never Sleeps

    ā€¢ Increasing sophistications of attacks
    ā€¢ Protect data and information
    ā€¢ Keeping up-to-date with security incidents and solutions
    ā€¢ Keeping the IT infrastructure in compliance with the IT Security Policy of the
      organization
    ā€¢ Keeping up-to-date with the changes to legal and regulatory requirements
    ā€¢ Reacting effectively and timely to security violations
    ā€¢ Effectively managing threats to data security
    ā€¢ Complexity of managing a broad portfolio of security tools/solutions
    ā€¢ Mobile clients and unmanaged devices
    ā€¢ Periodically conducting security awareness trainings to users within the
      organization




8    Ā© 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
Holistic Approach in Managing IT Security

                                                                                 Information Security Vision and Strategy

                                                                                           Business Initiatives
                                                                                                                           Threats
    Senior Management Commitment




                                                                                            Best/Acceptable
                                                                                               Practice




                                                                                                                                                   Training and Awareness
                                              Enterprise Architecture                          Legislation
                                                     Strategy                                                               Vulnerability & Risk
                                                                                                                               Assessment
                                                                                              Security Policy


                                                                                 Security Architecture and Technical Standards


                                                                   Administrative and End-User Guidelines, Practices and Procedures


                                                 Enforcement                                   Monitoring                            Recovery
                                                     Process                                     Process                             Process


                                                                                    Information Security Management


9                                  Ā© 2012 Protiviti Member Firm Kuwait W.L.L
                                   PUBLIC: 4th Kuwait Info Security Conference
Holistic Approach in Managing IT Security




10    Ā© 2012 Protiviti Member Firm Kuwait W.L.L
      PUBLIC: 4th Kuwait Info Security Conference
Prediction ā€“ Persistence ā€“ Patience - Preparedness




11   Ā© 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
If You Have Further Questions: Please visit us
     at Booth Number 8 and 9.


       Khalid Shaikh                                Phone: (965) ā€“ 66225122
       Senior Manager ā€“ Technology                  khalid.shaikh@protivitiglobal.com.kw
       Risk Services




          Powerful Insights. Proven Delivery.ā„¢




12    Ā© 2012 Protiviti Member Firm Kuwait W.L.L
      PUBLIC: 4th Kuwait Info Security Conference
13   Ā© 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference

More Related Content

Similar to Mr. Khalid Shaikh - emerging trends in managing it security

Examples of Systance's interventions
Examples of Systance's interventionsExamples of Systance's interventions
Examples of Systance's interventionsBernard JOUVEL
Ā 
GIS In Local Government Global Image
GIS In Local Government Global ImageGIS In Local Government Global Image
GIS In Local Government Global ImageGIS Global Image
Ā 
Ppt si-03-eng
Ppt si-03-engPpt si-03-eng
Ppt si-03-engvalbasp
Ā 
Appcelerator Mobile Development Platform
Appcelerator Mobile Development PlatformAppcelerator Mobile Development Platform
Appcelerator Mobile Development Platformrickross
Ā 
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto PresentazioneViii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazioneguestd1ae161
Ā 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsKim Escherich
Ā 
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a realityEfficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a realityBSP Media Group
Ā 
Ramon Montero's Presentation
Ramon Montero's PresentationRamon Montero's Presentation
Ramon Montero's Presentationguest41c26d
Ā 
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom Thierry Lestable
Ā 
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324Brochure ascen flow_en_110324
Brochure ascen flow_en_110324Galen Hsieh
Ā 
Introduction To Xener Systems
Introduction To  Xener  SystemsIntroduction To  Xener  Systems
Introduction To Xener SystemsGuisun Han
Ā 
Net blazr at is4cwn
Net blazr at is4cwnNet blazr at is4cwn
Net blazr at is4cwnBrough Turner
Ā 
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaEthernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaPuran Pangeni
Ā 
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri LankaAdoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri LankaWasantha Deshapriya
Ā 
Document Management In Pharma
Document Management In PharmaDocument Management In Pharma
Document Management In Pharmadhiria00
Ā 
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran DigitalDigital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran DigitalHeru Sutadi
Ā 
600 minutes: Internet of Things
600 minutes: Internet of Things600 minutes: Internet of Things
600 minutes: Internet of ThingsKim Escherich
Ā 

Similar to Mr. Khalid Shaikh - emerging trends in managing it security (20)

Examples of Systance's interventions
Examples of Systance's interventionsExamples of Systance's interventions
Examples of Systance's interventions
Ā 
GIS In Local Government Global Image
GIS In Local Government Global ImageGIS In Local Government Global Image
GIS In Local Government Global Image
Ā 
Ppt si-03-eng
Ppt si-03-engPpt si-03-eng
Ppt si-03-eng
Ā 
Appcelerator Mobile Development Platform
Appcelerator Mobile Development PlatformAppcelerator Mobile Development Platform
Appcelerator Mobile Development Platform
Ā 
09 03
09 0309 03
09 03
Ā 
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto PresentazioneViii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazione
Ā 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
Ā 
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a realityEfficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a reality
Ā 
Ramon Montero's Presentation
Ramon Montero's PresentationRamon Montero's Presentation
Ramon Montero's Presentation
Ā 
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Ā 
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324Brochure ascen flow_en_110324
Brochure ascen flow_en_110324
Ā 
Introduction To Xener Systems
Introduction To  Xener  SystemsIntroduction To  Xener  Systems
Introduction To Xener Systems
Ā 
Net blazr at is4cwn
Net blazr at is4cwnNet blazr at is4cwn
Net blazr at is4cwn
Ā 
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaEthernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
Ā 
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri LankaAdoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri Lanka
Ā 
Document Management In Pharma
Document Management In PharmaDocument Management In Pharma
Document Management In Pharma
Ā 
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran DigitalDigital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
Ā 
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Ā 
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Ā 
600 minutes: Internet of Things
600 minutes: Internet of Things600 minutes: Internet of Things
600 minutes: Internet of Things
Ā 

More from nooralmousa

Mr. Vivek Ramachandran - Advanced Wi-Ā­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-Ā­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-Ā­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-Ā­Fi Security Penetration Testingnooralmousa
Ā 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovationsnooralmousa
Ā 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
Ā 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
Ā 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
Ā 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
Ā 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsnooralmousa
Ā 
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for cisonooralmousa
Ā 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metricsnooralmousa
Ā 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keysnooralmousa
Ā 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudnooralmousa
Ā 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
Ā 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
Ā 

More from nooralmousa (13)

Mr. Vivek Ramachandran - Advanced Wi-Ā­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-Ā­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-Ā­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-Ā­Fi Security Penetration Testing
Ā 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
Ā 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
Ā 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Ā 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
Ā 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
Ā 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
Ā 
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
Ā 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
Ā 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
Ā 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Ā 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
Ā 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
Ā 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
Ā 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Ā 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
Ā 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
Ā 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
Ā 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
Ā 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
Ā 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
Ā 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
Ā 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ā 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Ā 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Ā 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Ā 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Ā 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Ā 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā 

Mr. Khalid Shaikh - emerging trends in managing it security

  • 1. Emerging Trends in Managing IT Security May 2012 Presentation by: Khalid Shaikh ā€“ Practice Head for IT Security and Privacy Services
  • 2. Changing Business Needs 1980 2000 2010 and beyond Internet Public Telephone Evolution Transformation Digital Set Top Customers Telephone, Third Telephone, Internet Third Internet Parties & Third Parties Parties & Third Parties Internet Third Internet Router Router Satellite dish Parties Lightpath ` ` Internet Internet Satellite dish Satellite dish Frame Optimum Cable Modem Relay Online Customers Optimum Oracle Online Optimum Untrusted Lightpath Corporate Cable Modem Corporate Cable Modem Customers Online Backbone Customers Backbone Customers Backbone Other Businesses and/or New Businesses Voice Voice Network Satellite dish Network Satellite dish Router Router Cable Frame Internet Relay Terminal Server PBX PBX Rainbow Media Lightpath Lightpath Digital Digital Set Top Set Top Customers Internet Employees & Customers Customers Third Parties Lightpath Public Satellite dish Lightpath Public Customers Telephone Customers Telephone 2 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 3. Emerging Technologies 3 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 4. Trends in IT Security Attack TREND 1 : Industrial Threats TREND 2 : Threats Within: Embedded Hardware TREND 3 : Hacktivism TREND 4 : Web Threatsā€¦. TREND 5 : Mobile Threats 4 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 5. Recent Events 5 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 6. Motives of Attack ā€¢ Industrial Espionage ā€¢ Financial ā€¢ Military ā€¢ Ideological ā€¢ Politics ā€¢ Prestige 6 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 7. Attack Tools are Freely Available 7 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 8. Security Never Sleeps ā€¢ Increasing sophistications of attacks ā€¢ Protect data and information ā€¢ Keeping up-to-date with security incidents and solutions ā€¢ Keeping the IT infrastructure in compliance with the IT Security Policy of the organization ā€¢ Keeping up-to-date with the changes to legal and regulatory requirements ā€¢ Reacting effectively and timely to security violations ā€¢ Effectively managing threats to data security ā€¢ Complexity of managing a broad portfolio of security tools/solutions ā€¢ Mobile clients and unmanaged devices ā€¢ Periodically conducting security awareness trainings to users within the organization 8 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 9. Holistic Approach in Managing IT Security Information Security Vision and Strategy Business Initiatives Threats Senior Management Commitment Best/Acceptable Practice Training and Awareness Enterprise Architecture Legislation Strategy Vulnerability & Risk Assessment Security Policy Security Architecture and Technical Standards Administrative and End-User Guidelines, Practices and Procedures Enforcement Monitoring Recovery Process Process Process Information Security Management 9 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 10. Holistic Approach in Managing IT Security 10 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 11. Prediction ā€“ Persistence ā€“ Patience - Preparedness 11 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 12. If You Have Further Questions: Please visit us at Booth Number 8 and 9. Khalid Shaikh Phone: (965) ā€“ 66225122 Senior Manager ā€“ Technology khalid.shaikh@protivitiglobal.com.kw Risk Services Powerful Insights. Proven Delivery.ā„¢ 12 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 13. 13 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference