SlideShare a Scribd company logo
2015 Security Trends
(So far…)
Edward Vasko, CISSP
CEO
About Terra Verde
Terra Verde provides customized risk
management services and solutions to your
business.
Our mission is to provide value driven, high quality
cybersecurity services and solutions our clients will
recommend to their associates, partners and peers.
1
Trend Trend Trend Trend
Trends
2015 Top Security Trends
Information Security is undergoing huge growth and changes.
The general public is now more than ever painfully aware of IT
Security. Technology is changing at an accelerated rate, threats
are evolving almost at the same pace.
• Data from our Scottsdale Security Operations Center (SOC)
• Virtualization
• Monitoring, Defense, Testing, Intelligence
• Network, Cloud, Mobility
• Identity and Access Mgmt.
• PCI DSS Compliance
2
Data from our SOC (1/2)
At Terra Verde we operate a Security Operations Center
monitoring security related events for thousands of systems
nationwide. From January 2015 until yesterday these are the top
events flooding our Security Information and Event Management
systems:
• Outdated clients (including frameworks): flash, java, PHP.
• Automated attacks are targeting these outdated systems.
• Vulnerable clients susceptible to Heartbleed and POODLE are
being attacked.
• CHS systems was hacked due to this weakness
(https://www.trustedsec.com/august-2014/chs-hacked-heartbleed-
exclusive-trustedsec/)
3
Data from our SOC (1/2)
• XSS "cross-site scripting“ attacks are on the rise.
• Combined phishing attacks with Stored XSS are making a comeback.
• Shellshock exploits are being attempted at an increased rate.
• BrowserStack was hacked vie ShellShock
(http://www.esecurityplanet.com/network-security/browserstack-
hacked-via-shellshock.html)
4
Data from our SOC (2/2)
• Attempted SQL injections are evolving.
• Reconnaissance scanning from high threat countries such
as China and Russia have increased in 2015 Q1.
• The use of exploit kits including angler, fiesta, magnitude
and nuclear are gaining popularity.
5
Virtualization (1/2)
• Security is being Virtualized
• Most solutions we grew accustomed to in data centers are
now readily available and deployable in the cloud. Anything
from routers and switched to specialized appliances.
• Security controls are now residing in the cloud.
• More and more organizations are migrating from data
centers to the cloud. With those migrations technical
security controls are now in the cloud as well. The
challenge is brokering the co-existence of these solutions.
6
Virtualization (2/2)
• Unified Threat Management
• SIEMs and other sophisticated monitoring solutions are evolving to
correlate live data to system’s events, potential threats, likelihood
and providing actionable data.
• Hybrid Environments
• Virtualization efforts are leaving behind hybrid environments. Full
migration is not possible every time. Deploying security controls
and administering in both the physical data center and the cloud
are posing a new set of challenges for organizations.
7
Monitoring, Defense, Testing, Intelligence (1/2)
• Threat detection and response
• Monitoring, Protection and Response are no longer
enough. The model is evolving to the realms of
avoidance. The new model is becoming: Detect,
Respond, Predict and Prevent.
• Big data security analytics
• Defenses against targeted attacks are now driven by
risk and justified by data analytics and
aggregation.
8
Monitoring, Defense, Testing, Intelligence (2/2)
• Security intelligence
• Security intelligence is improving significantly. It no
longer serves one audience (IT) it is now serving the
business too.
• Context-aware controls
• Next generation data loss prevention tools can be
adjusted to deal with multiple contexts: endpoint,
network, user, entity, channels, products and
analytics.
9
Network, Cloud, Mobility (1/3)
• UTM – Unified Threat Management is not quite integrated at
all levels and all devices. There are still some limitations in
terms of support and compatibility with all nodes that
generate security related events.
• Cloud Access Security brokerage services
• Contextual information from physical and virtual assets are leading to
policy decisions around:
• Operations: load balancing, access control, content delivery network
optimization, etc.
• Security: identity management, logging, monitoring, data loss prevention,
malware analysis, etc.
10
Network, Cloud, Mobility (2/3)
• Website protection
• Web application firewalls are being put to the test and they are
delivering exceptional services (not after some pain, you get what
you pay for and more importantly what you configured for)
• "Brobot" and "Kamikaze/Toxin“ botnets keep being used to launch
DDOS attacks toward financial institutions. Compromised high
bandwidth webservers with vulnerable content management
systems (CMS) are being used to upload attack scripts to the high
bandwidth servers.
11
Network, Cloud, Mobility (3/3)
• Endpoint breach shifting to mobile devices
• Increased number of threats are targeting mobile platforms.
• Researchers have demonstrated success rate of over 90%
(http://www.fiercewireless.com/tech/story/researchers-demo-92-
success-rate-hacking-smartphone-apps/2014-08-24)
• Smartphone-based POS applications attacks are on the rise.
• Mobile POS and app-based wallets are being targeted
• Most attacks on mobile devices still require human collaboration:
• Trojan, Trojan downloaders, Trojan-SMS, Trojan-spy,
backdoors, adware, etc.
12
PCI DSS Compliance
Payment Card Industry (PCI DSS)
• Version 3.0 introduced multiple challenges:
• Legal agreements 12.8.2
• Secure protocols (SSL)
• Card Data environments scope are increasingly challenged with
cloud solutions.
• Tokenization offers and solutions are not articulating vendor’s
responsibilities.
• EMV implementation deadlines are fast approaching.
• Requirement 9.9: Physical access and point of sale
13
THANK YOU!
Questions?
Edward.Vasko@tvrms.com
Office: 480-840-1744
info@TVRMS.com
http://www.TVRMS.com
About Terra Verde
About
• Established in 2008
• Headquartered in Scottsdale
• Payment Card Industry Qualified
Security Assessor – PCI QSA
• Pragmatic solutions to solve
problems
15
Key differentiators
• Objective and certified
• Experienced & dedicated
• Service team averages 18 years
experience
Primary markets served
• Health Care
• Financial Institutions
• Gaming/Hospitality
• Retail
• Technology
Background
• 40 FTEs
• Hundreds of engagements performed
worldwide
• Largest AZ headquartered security
company
Terra Verde Services
Assessment/Testing
• Penetration testing
• Vulnerability assessment
• Technical risk assessment
• Web security assessment
• Physical security assessment
Security Strategy
• Maturity assessment
• Interim leadership
• Program
support/implementation
• Control implementation
• Secure SDLC
Technology Operational Risk
• Advisory services
• Expert Witness
• Forensics/Incident Response
• Project Management
16
Compliance & Audit
PCI, HIPAA, SOX, FTC, FISMA, CSP,
ISO, etc.
Terra Verde Solutions
Managed Security
• Device monitoring
• Security device
management
• Web application firewall
• Vulnerability Management
• Compliance portal
• Patching
• 24x7 US based SOC
Audit Documentation
• Eliminate audit fire drills
• “Business as Usual”
• Reduce compliance costs
Application Monitoring
• Metrics
• Performance/availability
• Secure SDLC
17

More Related Content

What's hot

Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceIvanti
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017EQS Group
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHEQS Group
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDragos, Inc.
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechDell EMC World
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity GroupsDragos, Inc.
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_InsightTim Bell
 

What's hot (20)

Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch Intelligence
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
 
2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups2018 Year in Review- ICS Threat Activity Groups
2018 Year in Review- ICS Threat Activity Groups
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_Insight
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 

Viewers also liked

Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information SecurityCompTIA
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Shahar Geiger Maor
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Les xarxes socials
Les xarxes socialsLes xarxes socials
Les xarxes socialsXSAlejandroP
 
Weather forecast powerpoint
Weather forecast powerpointWeather forecast powerpoint
Weather forecast powerpointalaynasandefur
 
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~orthomedico
 
TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内yamato-c
 
Topic mother’s day
Topic mother’s dayTopic mother’s day
Topic mother’s daytappasarn
 
PCI 3.0 – What You Need to Know
PCI 3.0 – What You Need to KnowPCI 3.0 – What You Need to Know
PCI 3.0 – What You Need to KnowTerra Verde
 
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-orthomedico
 
Irakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakIrakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakJavi Echarri
 
FXLab_platform_ru
FXLab_platform_ruFXLab_platform_ru
FXLab_platform_ruLyubich
 
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~orthomedico
 

Viewers also liked (20)

Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Les xarxes socials
Les xarxes socialsLes xarxes socials
Les xarxes socials
 
Weather forecast powerpoint
Weather forecast powerpointWeather forecast powerpoint
Weather forecast powerpoint
 
Super tech
Super techSuper tech
Super tech
 
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
 
TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内
 
Topic mother’s day
Topic mother’s dayTopic mother’s day
Topic mother’s day
 
PCI 3.0 – What You Need to Know
PCI 3.0 – What You Need to KnowPCI 3.0 – What You Need to Know
PCI 3.0 – What You Need to Know
 
New employees primer
New employees primerNew employees primer
New employees primer
 
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
 
Irakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakIrakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapak
 
FXLab_platform_ru
FXLab_platform_ruFXLab_platform_ru
FXLab_platform_ru
 
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
 
Designing a showroom
Designing a showroomDesigning a showroom
Designing a showroom
 
Gustar project
Gustar projectGustar project
Gustar project
 

Similar to 2015 Year to Date Security Trends

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Arushi00
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Alert Logic
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Netpluz Asia Pte Ltd
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Build a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecBuild a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecArrow ECS UK
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Marco Casassa Mont
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 

Similar to 2015 Year to Date Security Trends (20)

Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Build a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with SymantecBuild a Cyber Resilient Network with Symantec
Build a Cyber Resilient Network with Symantec
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 

Recently uploaded

Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 

Recently uploaded (20)

Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 

2015 Year to Date Security Trends

  • 1. 2015 Security Trends (So far…) Edward Vasko, CISSP CEO
  • 2. About Terra Verde Terra Verde provides customized risk management services and solutions to your business. Our mission is to provide value driven, high quality cybersecurity services and solutions our clients will recommend to their associates, partners and peers. 1
  • 3. Trend Trend Trend Trend Trends 2015 Top Security Trends Information Security is undergoing huge growth and changes. The general public is now more than ever painfully aware of IT Security. Technology is changing at an accelerated rate, threats are evolving almost at the same pace. • Data from our Scottsdale Security Operations Center (SOC) • Virtualization • Monitoring, Defense, Testing, Intelligence • Network, Cloud, Mobility • Identity and Access Mgmt. • PCI DSS Compliance 2
  • 4. Data from our SOC (1/2) At Terra Verde we operate a Security Operations Center monitoring security related events for thousands of systems nationwide. From January 2015 until yesterday these are the top events flooding our Security Information and Event Management systems: • Outdated clients (including frameworks): flash, java, PHP. • Automated attacks are targeting these outdated systems. • Vulnerable clients susceptible to Heartbleed and POODLE are being attacked. • CHS systems was hacked due to this weakness (https://www.trustedsec.com/august-2014/chs-hacked-heartbleed- exclusive-trustedsec/) 3
  • 5. Data from our SOC (1/2) • XSS "cross-site scripting“ attacks are on the rise. • Combined phishing attacks with Stored XSS are making a comeback. • Shellshock exploits are being attempted at an increased rate. • BrowserStack was hacked vie ShellShock (http://www.esecurityplanet.com/network-security/browserstack- hacked-via-shellshock.html) 4
  • 6. Data from our SOC (2/2) • Attempted SQL injections are evolving. • Reconnaissance scanning from high threat countries such as China and Russia have increased in 2015 Q1. • The use of exploit kits including angler, fiesta, magnitude and nuclear are gaining popularity. 5
  • 7. Virtualization (1/2) • Security is being Virtualized • Most solutions we grew accustomed to in data centers are now readily available and deployable in the cloud. Anything from routers and switched to specialized appliances. • Security controls are now residing in the cloud. • More and more organizations are migrating from data centers to the cloud. With those migrations technical security controls are now in the cloud as well. The challenge is brokering the co-existence of these solutions. 6
  • 8. Virtualization (2/2) • Unified Threat Management • SIEMs and other sophisticated monitoring solutions are evolving to correlate live data to system’s events, potential threats, likelihood and providing actionable data. • Hybrid Environments • Virtualization efforts are leaving behind hybrid environments. Full migration is not possible every time. Deploying security controls and administering in both the physical data center and the cloud are posing a new set of challenges for organizations. 7
  • 9. Monitoring, Defense, Testing, Intelligence (1/2) • Threat detection and response • Monitoring, Protection and Response are no longer enough. The model is evolving to the realms of avoidance. The new model is becoming: Detect, Respond, Predict and Prevent. • Big data security analytics • Defenses against targeted attacks are now driven by risk and justified by data analytics and aggregation. 8
  • 10. Monitoring, Defense, Testing, Intelligence (2/2) • Security intelligence • Security intelligence is improving significantly. It no longer serves one audience (IT) it is now serving the business too. • Context-aware controls • Next generation data loss prevention tools can be adjusted to deal with multiple contexts: endpoint, network, user, entity, channels, products and analytics. 9
  • 11. Network, Cloud, Mobility (1/3) • UTM – Unified Threat Management is not quite integrated at all levels and all devices. There are still some limitations in terms of support and compatibility with all nodes that generate security related events. • Cloud Access Security brokerage services • Contextual information from physical and virtual assets are leading to policy decisions around: • Operations: load balancing, access control, content delivery network optimization, etc. • Security: identity management, logging, monitoring, data loss prevention, malware analysis, etc. 10
  • 12. Network, Cloud, Mobility (2/3) • Website protection • Web application firewalls are being put to the test and they are delivering exceptional services (not after some pain, you get what you pay for and more importantly what you configured for) • "Brobot" and "Kamikaze/Toxin“ botnets keep being used to launch DDOS attacks toward financial institutions. Compromised high bandwidth webservers with vulnerable content management systems (CMS) are being used to upload attack scripts to the high bandwidth servers. 11
  • 13. Network, Cloud, Mobility (3/3) • Endpoint breach shifting to mobile devices • Increased number of threats are targeting mobile platforms. • Researchers have demonstrated success rate of over 90% (http://www.fiercewireless.com/tech/story/researchers-demo-92- success-rate-hacking-smartphone-apps/2014-08-24) • Smartphone-based POS applications attacks are on the rise. • Mobile POS and app-based wallets are being targeted • Most attacks on mobile devices still require human collaboration: • Trojan, Trojan downloaders, Trojan-SMS, Trojan-spy, backdoors, adware, etc. 12
  • 14. PCI DSS Compliance Payment Card Industry (PCI DSS) • Version 3.0 introduced multiple challenges: • Legal agreements 12.8.2 • Secure protocols (SSL) • Card Data environments scope are increasingly challenged with cloud solutions. • Tokenization offers and solutions are not articulating vendor’s responsibilities. • EMV implementation deadlines are fast approaching. • Requirement 9.9: Physical access and point of sale 13
  • 16. About Terra Verde About • Established in 2008 • Headquartered in Scottsdale • Payment Card Industry Qualified Security Assessor – PCI QSA • Pragmatic solutions to solve problems 15 Key differentiators • Objective and certified • Experienced & dedicated • Service team averages 18 years experience Primary markets served • Health Care • Financial Institutions • Gaming/Hospitality • Retail • Technology Background • 40 FTEs • Hundreds of engagements performed worldwide • Largest AZ headquartered security company
  • 17. Terra Verde Services Assessment/Testing • Penetration testing • Vulnerability assessment • Technical risk assessment • Web security assessment • Physical security assessment Security Strategy • Maturity assessment • Interim leadership • Program support/implementation • Control implementation • Secure SDLC Technology Operational Risk • Advisory services • Expert Witness • Forensics/Incident Response • Project Management 16 Compliance & Audit PCI, HIPAA, SOX, FTC, FISMA, CSP, ISO, etc.
  • 18. Terra Verde Solutions Managed Security • Device monitoring • Security device management • Web application firewall • Vulnerability Management • Compliance portal • Patching • 24x7 US based SOC Audit Documentation • Eliminate audit fire drills • “Business as Usual” • Reduce compliance costs Application Monitoring • Metrics • Performance/availability • Secure SDLC 17