SlideShare a Scribd company logo
Top Security Trends and Takeaways for 2013
March 2013
2
Agenda
 The Coming Together of Cloud and Mobility
 IT Embedded Across Industries
 IT Security Market Evolution
 Social Media and Consumerisation
 Cloud and Mobile Threats
3
The Coming Together of Computing and Mobility
1970s1960s 1980s 1990s 2000
Mainframe
Supercomputer
2010
Cloud
Smart Phones
&
Tablets
Personal
Computer
Laptop/
Notebook
Mobile
Phone
(2G)
4
Mobile Ahead as Means of Connecting to the Internet
4
Source: Statcounter Global Stats, KPCB
5
Bandwidth Requirements
Emails
Internet
browsing
Social Networking
Online
Shopping
P2P File
Sharing
Real time Communications
Smart City Infrastructure
Tele-medicine
Connected Cars
Tele-education
Smart Grids
Next Generation TV
M2M
Application/ContentRequirements
< 1Mbps 3 - 7 Mbps 100 Mbps - 1 Gbps
Rich Communications o Increasing demand from consumers
for virtual equivalent communication
and entertainment experiences. For
example, low latency in high graphics
gaming.
o Demand from enterprises (e.g. SMEs)
for cost effective productivity
applications such as cloud computing.
o Demand from the public sector to
increase administrative efficiency via
smart city infrastructure.
NBN: Possibilities
ConvergenceBasic
Cloud Computing
High Speed Networks and Convergence
6
Example: Self-Driving Automobiles
• Google has been working on this for four years
now.
• Automobile manufacturers are also
researching including GM, BMW and Audi
• February 2012 – Nevada passes first laws in
the USA to allow driverless cars on its
highways.
• General Motors predicts the technology will
be standard by 2020.
Convergence of different industries? Security
Implications?
7
‘Virtual’ World Security Issues Massively Impacting
‘Physical’ World
South Korea
Steps Up
Security at
Nuclear Plants
8
1985-1995 1995-2005 2005-2015 2015 Onwards
Source: Frost & Sullivan.
Maladvertising
,Ransonware
PC Viruses
Spam
Internet
Viruses
Phishing,
Bots,
Spyware
DDOS,
Worms,
Trojans
Social Media,
Mobile, Cloud,
APTs Watering
holes
Impact
Cyber-
everything,
Threat Evolution and Impact
9
1,979.4
2,205.6
2,448.6
2,716.7
3,015.3
1,413.9
1,600.5
1,972.1
2,390.0
2,881.9
570.6
664.3
785.4
936.3
1,120.0
112.9 140.5 181.0 242.7 313.1
78.5 103.1 136.9 184.5 254.0
48.4 70.4 105.7 162.3
252.2
57.8 84.9 121.6 169.1 207.9
21.9 30.2 51.3 69.5 89.2
0.0
500.0
1,000.0
1,500.0
2,000.0
2,500.0
3,000.0
3,500.0
2011 2012 2013 2014 2015
Network Security
CAGR (2012-2015):
11.0%
MSS
CAGR (2012-2015):
21.7%
SCM
CAGR (2012-2015):
19.0%
SIEM
CAGR (2012-2015):
30.6%
WAF
CAGR (2012-2015):
35.0%
Virtualization Security
CAGR (2012-2015):
53.0%
DLP
CAGR (2012-2015):
34.8%
Mobile Security
CAGR (2012-2015):
43.5%
TotalRevenue(US$
Million)Security Market Size and Forecast
10
Social Media is now a Key Part of Customer Experience
Customers are
discussing your
products/services
Customers are sharing experiences online
Social Media gives you the ability to listen to customers,
even when they are not calling you
Social Media has the power to significantly impact your
business, so ignoring this channel is no longer an option
11
Social Media becomes Preferred Platform for Malware
• Social media is becoming the
most attractive platform for
malware as mobile devices
become the most attractive
hardware
• Young people are often very
susceptible to social media
scams as they are often less
cautious about sharing personal
information
• Spam and phishing is shifting to
social media platforms
12
Public
Domain
Personal
Domain
Professional
Domain
What the Individual wants:
 Persona Integration
 Single Device Mentality
 Freedom of Choice
Conflict Theatre – The Human Factor
What the Enterprise wants:
 Persona Differentiation
 Visibility into User Behaviors
 Power of Control
Public
Domain
Professiona
l Domain
Personal
Domain
Source: Frost & Sullivan
13
3.6
3.83.8
4.1
4.2
2.0
3.0
4.0
5.0
CostService Level
Agreement (SLA)
Service OfferingsUptime and
Reliability
Concerns
Security & Data
Privacy Concern
How would you rate the level of impact that the following factors have in your decision
making when it comes to cloud services in general?
MeanScore
APAC End-User Study – Adopting Cloud Services
N = 210.
Source: Frost & Sullivan
14
Mobile Security Revenue Forecast
-20.0
-10.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
90.0
100.0
2011 2012 2013 2014 2015
Revenue 21.9 30.2 51.3 69.5 89.2
Growth Rate 37.9 69.9 35.5 28.3
Revenue($Million)
Mobile Security Market: Revenue Forecast
APAC, 2012–2015
CAGR = 43.5%
-
GrowthRate
(%)
Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
15
Android: A Mecca for Malware
• OS fragmentation – mobile carriers not pushing updates aggressively enough.
Google controlled Nexus 4 is much more secure.
• Exposed source code and dominant mobile platform.
• Source of malware is often apps e.g, fake Instagram and fake Angry Birds that
send messages to premium rate SMS services.
• Linux based code is familiar territory for many hackers
• Will Google and the carriers respond?
16
Conclusions
• IT security is now having a profound effect on the „physical world‟.
• Embedded IT is massively increasing the potential impact
• Cloud, mobile and social are driving new security threats
• Cyberespionage and cybersabotage are becoming a reality. – more state
sponsored cyber attacks
• “Just as nuclear was the strategic warfare of the industrial era, cyber warfare
has become the strategic warfare of the information era” US Secretary of
Defence, Leon Panetta.
17
Thank You
For further questions and enquiries
Andrew Milroy
Vice President - ICT
Frost & Sullivan
Email: andrew.milroy@frost.com
Twitter: andy1994

More Related Content

What's hot

The Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTsThe Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTs
mobilesquared Ltd
 
Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)
Ramesh Kumar
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
NOAH Advisors
 
Technology Trends 2016 Part I
Technology Trends 2016 Part ITechnology Trends 2016 Part I
Technology Trends 2016 Part I
Axel & Boris™
 
Enforcing accountability in media using blockchain
Enforcing accountability in media using blockchainEnforcing accountability in media using blockchain
Enforcing accountability in media using blockchain
Rob Van Den Dam
 
Telecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launchTelecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launch
Bella Harris
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
Unesco Telemedicine
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Lookout
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
Symantec
 
Future of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomyFuture of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomy
Mauricio Vetrano
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
Symantec
 
An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)
Dan Mo
 
Mobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunitiesMobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunities
Bloomberg LP
 
Mobile Monday on FreSh
Mobile Monday on FreShMobile Monday on FreSh
Mobile Monday on FreSh
Pitra Satvika
 
20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1 20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1
The Valley
 
2014 Fortune 500 infographic
2014 Fortune 500 infographic2014 Fortune 500 infographic
2014 Fortune 500 infographic
AppDirect
 
Internet of Things Facts and Stats
Internet of Things Facts and StatsInternet of Things Facts and Stats
Internet of Things Facts and Stats
Intelligentia IT Systems Pvt. Ltd.
 
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
 The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic... The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic...
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
marketresearchreports.biz
 

What's hot (20)

The Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTsThe Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTs
 
Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
Technology Trends 2016 Part I
Technology Trends 2016 Part ITechnology Trends 2016 Part I
Technology Trends 2016 Part I
 
Enforcing accountability in media using blockchain
Enforcing accountability in media using blockchainEnforcing accountability in media using blockchain
Enforcing accountability in media using blockchain
 
Telecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launchTelecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launch
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Future of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomyFuture of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomy
 
The mobile economy_2013
The mobile economy_2013The mobile economy_2013
The mobile economy_2013
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)
 
Mobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunitiesMobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunities
 
Mobile Monday on FreSh
Mobile Monday on FreShMobile Monday on FreSh
Mobile Monday on FreSh
 
20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1 20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1
 
2014 Fortune 500 infographic
2014 Fortune 500 infographic2014 Fortune 500 infographic
2014 Fortune 500 infographic
 
Internet of Things Facts and Stats
Internet of Things Facts and StatsInternet of Things Facts and Stats
Internet of Things Facts and Stats
 
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
 The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic... The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic...
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
 

Similar to andrew milroy - top security trends and takeaways for 2013

2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)
CM Research
 
Ltb2014 digital deployment as a competitive advantage-shaun collins
Ltb2014   digital deployment as a competitive advantage-shaun collinsLtb2014   digital deployment as a competitive advantage-shaun collins
Ltb2014 digital deployment as a competitive advantage-shaun collins
KPN Zakelijke Markt
 
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Occams Business Research & Consulting
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
m12016changTIIMP
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointFelipe Lamus
 
Telecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyondTelecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyond
Ahmad Yokasano
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Francesca Valente
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
LiveAction Next Generation Network Management Software
 
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013 Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Evgeniy Kozlov
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
TechSci Research
 
A Mobile First Future
A Mobile First FutureA Mobile First Future
A Mobile First Future
Samsung Business USA
 
Ash Dahod Mobile Data Deluge
Ash Dahod Mobile Data DelugeAsh Dahod Mobile Data Deluge
Ash Dahod Mobile Data Deluge
Christine Nolan
 
Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit
William Barney
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)
CM Research
 
Technology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforceTechnology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforce
IMC Institute
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Oscar Romano
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosion
Paul Van Doorn
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
Knud Lasse Lueth
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoTAnalytics
 

Similar to andrew milroy - top security trends and takeaways for 2013 (20)

2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)
 
Ltb2014 digital deployment as a competitive advantage-shaun collins
Ltb2014   digital deployment as a competitive advantage-shaun collinsLtb2014   digital deployment as a competitive advantage-shaun collins
Ltb2014 digital deployment as a competitive advantage-shaun collins
 
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power Point
 
Telecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyondTelecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyond
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013 Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
A Mobile First Future
A Mobile First FutureA Mobile First Future
A Mobile First Future
 
Ash Dahod Mobile Data Deluge
Ash Dahod Mobile Data DelugeAsh Dahod Mobile Data Deluge
Ash Dahod Mobile Data Deluge
 
Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)
 
Technology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforceTechnology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforce
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosion
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
 

More from Graeme Wood

TechCatalyst free assessment
TechCatalyst free assessment TechCatalyst free assessment
TechCatalyst free assessment
Graeme Wood
 
TechCatalyst Corporate Overview
TechCatalyst Corporate Overview TechCatalyst Corporate Overview
TechCatalyst Corporate Overview
Graeme Wood
 
How does semantic technology work?
How does semantic technology work? How does semantic technology work?
How does semantic technology work?
Graeme Wood
 
AI and the Financial Service Segment
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service Segment
Graeme Wood
 
Ai and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewAi and Legal Industy - Executive Overview
Ai and Legal Industy - Executive Overview
Graeme Wood
 
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing
Graeme Wood
 
Introduction to Semantic Computing
Introduction to Semantic ComputingIntroduction to Semantic Computing
Introduction to Semantic Computing
Graeme Wood
 
AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721Graeme Wood
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 
Raimund genes from traditional malware to targeted attacks
Raimund genes    from traditional malware to targeted attacksRaimund genes    from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacksGraeme Wood
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010
Graeme Wood
 
Anz cloud thought leadership 16 mar
Anz cloud thought leadership 16 marAnz cloud thought leadership 16 mar
Anz cloud thought leadership 16 mar
Graeme Wood
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Graeme Wood
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 

More from Graeme Wood (15)

TechCatalyst free assessment
TechCatalyst free assessment TechCatalyst free assessment
TechCatalyst free assessment
 
TechCatalyst Corporate Overview
TechCatalyst Corporate Overview TechCatalyst Corporate Overview
TechCatalyst Corporate Overview
 
How does semantic technology work?
How does semantic technology work? How does semantic technology work?
How does semantic technology work?
 
AI and the Financial Service Segment
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service Segment
 
Ai and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewAi and Legal Industy - Executive Overview
Ai and Legal Industy - Executive Overview
 
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing
 
Introduction to Semantic Computing
Introduction to Semantic ComputingIntroduction to Semantic Computing
Introduction to Semantic Computing
 
AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Raimund genes from traditional malware to targeted attacks
Raimund genes    from traditional malware to targeted attacksRaimund genes    from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010
 
Anz cloud thought leadership 16 mar
Anz cloud thought leadership 16 marAnz cloud thought leadership 16 mar
Anz cloud thought leadership 16 mar
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

andrew milroy - top security trends and takeaways for 2013

  • 1. Top Security Trends and Takeaways for 2013 March 2013
  • 2. 2 Agenda  The Coming Together of Cloud and Mobility  IT Embedded Across Industries  IT Security Market Evolution  Social Media and Consumerisation  Cloud and Mobile Threats
  • 3. 3 The Coming Together of Computing and Mobility 1970s1960s 1980s 1990s 2000 Mainframe Supercomputer 2010 Cloud Smart Phones & Tablets Personal Computer Laptop/ Notebook Mobile Phone (2G)
  • 4. 4 Mobile Ahead as Means of Connecting to the Internet 4 Source: Statcounter Global Stats, KPCB
  • 5. 5 Bandwidth Requirements Emails Internet browsing Social Networking Online Shopping P2P File Sharing Real time Communications Smart City Infrastructure Tele-medicine Connected Cars Tele-education Smart Grids Next Generation TV M2M Application/ContentRequirements < 1Mbps 3 - 7 Mbps 100 Mbps - 1 Gbps Rich Communications o Increasing demand from consumers for virtual equivalent communication and entertainment experiences. For example, low latency in high graphics gaming. o Demand from enterprises (e.g. SMEs) for cost effective productivity applications such as cloud computing. o Demand from the public sector to increase administrative efficiency via smart city infrastructure. NBN: Possibilities ConvergenceBasic Cloud Computing High Speed Networks and Convergence
  • 6. 6 Example: Self-Driving Automobiles • Google has been working on this for four years now. • Automobile manufacturers are also researching including GM, BMW and Audi • February 2012 – Nevada passes first laws in the USA to allow driverless cars on its highways. • General Motors predicts the technology will be standard by 2020. Convergence of different industries? Security Implications?
  • 7. 7 ‘Virtual’ World Security Issues Massively Impacting ‘Physical’ World South Korea Steps Up Security at Nuclear Plants
  • 8. 8 1985-1995 1995-2005 2005-2015 2015 Onwards Source: Frost & Sullivan. Maladvertising ,Ransonware PC Viruses Spam Internet Viruses Phishing, Bots, Spyware DDOS, Worms, Trojans Social Media, Mobile, Cloud, APTs Watering holes Impact Cyber- everything, Threat Evolution and Impact
  • 9. 9 1,979.4 2,205.6 2,448.6 2,716.7 3,015.3 1,413.9 1,600.5 1,972.1 2,390.0 2,881.9 570.6 664.3 785.4 936.3 1,120.0 112.9 140.5 181.0 242.7 313.1 78.5 103.1 136.9 184.5 254.0 48.4 70.4 105.7 162.3 252.2 57.8 84.9 121.6 169.1 207.9 21.9 30.2 51.3 69.5 89.2 0.0 500.0 1,000.0 1,500.0 2,000.0 2,500.0 3,000.0 3,500.0 2011 2012 2013 2014 2015 Network Security CAGR (2012-2015): 11.0% MSS CAGR (2012-2015): 21.7% SCM CAGR (2012-2015): 19.0% SIEM CAGR (2012-2015): 30.6% WAF CAGR (2012-2015): 35.0% Virtualization Security CAGR (2012-2015): 53.0% DLP CAGR (2012-2015): 34.8% Mobile Security CAGR (2012-2015): 43.5% TotalRevenue(US$ Million)Security Market Size and Forecast
  • 10. 10 Social Media is now a Key Part of Customer Experience Customers are discussing your products/services Customers are sharing experiences online Social Media gives you the ability to listen to customers, even when they are not calling you Social Media has the power to significantly impact your business, so ignoring this channel is no longer an option
  • 11. 11 Social Media becomes Preferred Platform for Malware • Social media is becoming the most attractive platform for malware as mobile devices become the most attractive hardware • Young people are often very susceptible to social media scams as they are often less cautious about sharing personal information • Spam and phishing is shifting to social media platforms
  • 12. 12 Public Domain Personal Domain Professional Domain What the Individual wants:  Persona Integration  Single Device Mentality  Freedom of Choice Conflict Theatre – The Human Factor What the Enterprise wants:  Persona Differentiation  Visibility into User Behaviors  Power of Control Public Domain Professiona l Domain Personal Domain Source: Frost & Sullivan
  • 13. 13 3.6 3.83.8 4.1 4.2 2.0 3.0 4.0 5.0 CostService Level Agreement (SLA) Service OfferingsUptime and Reliability Concerns Security & Data Privacy Concern How would you rate the level of impact that the following factors have in your decision making when it comes to cloud services in general? MeanScore APAC End-User Study – Adopting Cloud Services N = 210. Source: Frost & Sullivan
  • 14. 14 Mobile Security Revenue Forecast -20.0 -10.0 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 90.0 100.0 2011 2012 2013 2014 2015 Revenue 21.9 30.2 51.3 69.5 89.2 Growth Rate 37.9 69.9 35.5 28.3 Revenue($Million) Mobile Security Market: Revenue Forecast APAC, 2012–2015 CAGR = 43.5% - GrowthRate (%) Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
  • 15. 15 Android: A Mecca for Malware • OS fragmentation – mobile carriers not pushing updates aggressively enough. Google controlled Nexus 4 is much more secure. • Exposed source code and dominant mobile platform. • Source of malware is often apps e.g, fake Instagram and fake Angry Birds that send messages to premium rate SMS services. • Linux based code is familiar territory for many hackers • Will Google and the carriers respond?
  • 16. 16 Conclusions • IT security is now having a profound effect on the „physical world‟. • Embedded IT is massively increasing the potential impact • Cloud, mobile and social are driving new security threats • Cyberespionage and cybersabotage are becoming a reality. – more state sponsored cyber attacks • “Just as nuclear was the strategic warfare of the industrial era, cyber warfare has become the strategic warfare of the information era” US Secretary of Defence, Leon Panetta.
  • 17. 17 Thank You For further questions and enquiries Andrew Milroy Vice President - ICT Frost & Sullivan Email: andrew.milroy@frost.com Twitter: andy1994