SlideShare a Scribd company logo
THREAT LANDSCAPE Q4 2011

                                      Joe Schorr
                           Practice Manager
                          Enterprise Security




1                   800.747.8585 | help@cbihome.com
CBI Introduction

Information Technology and Security Solutions Provider
   • Symantec Partner of the Year, Finalist
   • Symantec Platinum Partner
   • Globally capable, superior technical service

Experienced Professionals
   • Operating for 20 years serving more than 500 clients world wide.
   • Broad customer base ranging from mid-size to Fortune 100

Experienced in Variety of Industries
    • Healthcare                         • Government
    • Banking & Financial Services       • Legal
    • Manufacturing                      • Retail
    • Education

2
2                                                            800.747.8585 | help@cbihome.com
2011 Services Strategy


    Enterprise              Server      Endpoint           Datacenter
                 IT GRC
     Security             Management   Management         Management




3
3                                                   800.747.8585 | help@cbihome.com
Agenda



     Key Security Trends


     Threat Landscape


     IT and InfoSec Evolution


     Security Solutions



4                               800.747.8585 | help@cbihome.com
Key Security Trends

                                               CHALLENGING
                                             THREAT LANDSCAPE


                                                                  MALICIOUS INSIDERS
                                    TARGETED ATTACKS




                                                                                                INCREASING
                 EVOLVING                                                                       COMPLEXITY
                                                 INCREASING FINANCIAL
        INFRASTRUCTURE                                 AND BRAND RISK




                                                                                       DATA GROWTH         COMPLIANCE
                                                                                                           REQUIREMENTS
        MOBILE              VIRTUALIZATION




                                                                                                VENDOR COMPLEXITY
                    CLOUD


5                                                                                                    800.747.8585 | help@cbihome.com
The New Threat Landscape

       Targeted Attacks

                               Cyber Flash Mob



         Cybercrime

                               The evolved insider
                                    threat

        What’s next?




6                                          800.747.8585 | help@cbihome.com
Targeted Attacks




7                  800.747.8585 | help@cbihome.com
Hacktivism and the Cyber Flash Mob




8                                    800.747.8585 | help@cbihome.com
Cybercrime




             The world's most popular open source database




9                                                800.747.8585 | help@cbihome.com
Cyber-espionage




                  A picture of the hacking software shown during the Chinese
                  military program. The large writing at the top says "Select Attack
                  Target." Next, the user choose an IP address to attack from (it
                  belongs to an American university). The drop-down box is a list
                  of Falun Gong websites, while the button on the left says
                  "Attack."
10                                                          800.747.8585 | help@cbihome.com
Evolution of the insider threat




                            +
               =
11                                800.747.8585 | help@cbihome.com
What’s next?


•Blended
 weaponized
 STUXNET
 clones
•Endpoint
 Compromise
•CA Attacks
•SSL > TLS
12             800.747.8585 | help@cbihome.com
IT Must Evolve to Meet New Demands

      System-Centric                 Information-Centric




      •   Data: Centralized,         •   Data: Distributed,
          structured                     unstructured
      •   Infrastructure: Physical   •   Infrastructure: Physical,
                                         virtual, cloud, mobile
      •   IT focus: Systems tasks        outsourced
                                     •   IT Focus: Information




13
13                                                         800.747.8585 | help@cbihome.com
Our Information Centric Approach


                          RISK
                                                  Policy                  PHYSICAL
                                                  Identity
                                                  Compliance              VIRTUAL
                                                  Remediate
                                 Governance       Manage Risk             CLOUD

            Store                                                         MOBILE
         Manage
                                 INFORMATION
          Protect
         Recover

                    Infrastructure        Intelligence
         COST                                                     VALUE

                                               Classify
                                               Discover
                                               Ownership
                                               Assess



14
14                                                              800.747.8585 | help@cbihome.com
Addressing Security Challenges at Each Layer


           GOVERNANCE                         INTELLIGENCE             INFRASTRUCTURE
          Policy Driven and             Information and Identity       Well Managed and
             Risk Based                         Centric                     Secure


     • Develop and enforce policies     • Classify critical data    • Protect against customized
                                                                      targeted attacks
     • Identify and authenticate        • Discover where data is
                                                                    • Secure virtual and cloud-
                                                                      based environments
     • Assess against policies          • Apply encryption
                                                                    • Manage and secure data
     • Prioritize remediation based     • Monitor threats to data     on mobile devices
       on risk

     • Deliver multi-level reports to
       manage IT risks



15
15                                                                        800.747.8585 | help@cbihome.com
Symantec Security Solutions

     GOVERNANCE
     Develop Policies, Manage Risk   Control Compliance Suite
     Authenticate Identities         VeriSign™ Identity & Authentication

     INTELLIGENCE
     Protect the Information         Data Loss Prevention Suite & Encryption
     Identity Threats                Global Intelligence Network & Managed Security Services

     INFRASTRUCTURE
     Manage Systems                  IT Management Suite
     Protect the Infrastructure      Symantec Protection Suite
     Cloud                           Symantec.Cloud
                                                                                                  1
16                                                                     800.747.8585 | help@cbihome.com
                                                                                                  6
Why Symantec for Enterprise Security?

                                We protect   1 billion
                                systems around the world

                                 Market share    Leader
#                                 in 8 security segments


                                Twice The market share
                              of next largest competitor in 3 of
                                        the 8 segments

                                Gartner  MQ Leader
                                in 6 of 6 security segments


                                The  Largest    IT Security
                                   Company in the world


17
17                                       800.747.8585 | help@cbihome.com
Global Intelligence Network
Identifies more threats, takes action faster & prevents impact



                    Calgary, Alberta                                          Dublin, Ireland

                                                                 Reading, England

                                                                                                                                                                            Tokyo, Japan
      San Francisco, CA
      Mountain View, CA                Austin, TX                                                                                          Chengdu, China
                                                             Alexandria, VA
            Culver City, CA
                                                                                                                                                                Taipei, Taiwan
                                                                                                                                    Chennai, India
                                                                                                                     Pune, India
                                                                                                                   Chennai, India




                                                                                                                                            Sydney, Australia



                  Worldwide Coverage                                    Global Scope and Scale                                      24x7 Event Logging

                                                                                Rapid Detection
 Attack Activity                                    Malware Intelligence                           Vulnerabilities                                   Spam/Phishing
 • 240,000 sensors                                   • 150M client, server,                     • 35,000+ vulnerabilities                        • 5M decoy accounts
• 200+ countries and                                   gateways monitored                          • 11,000 vendors                            • 8B+ email messages/day
     territories                                       • Global coverage                         • 80,000 technologies                          • 1B+ web requests/day

              Preemptive Security Alerts                                Information Protection                                Threat Triggered Actions

18                                                                                                                                   800.747.8585 | help@cbihome.com
Next Steps




     Security and Advisory Assessments
     – In-depth, consultative engagements
     – Evaluate and improve your overall security program
     – Address specific concerns (e.g. PCI/ mobile security issues)




19
19                                                               800.747.8585 | help@cbihome.com
Thank You




            Thank You!

                    Joe Schorr
            jschorr@cbihome.com
                    @JoeSchorr


20                 800.747.8585 | help@cbihome.com

More Related Content

What's hot

Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Symantec APJ
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
EMC
 
Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacks
Vladimir Matviychuk
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
finance40
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information Challenge
IBMGovernmentCA
 
Axoss Security Awareness Services
Axoss Security Awareness ServicesAxoss Security Awareness Services
Axoss Security Awareness Services
Bulent Buyukkahraman
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
Lakshmi Subramanian
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Fernando Reiser
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
Marlabs
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
S-RM Risk and Intelligence Consulting
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
gueste69f645
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
 
pci compliance for dummies
pci compliance for dummiespci compliance for dummies
pci compliance for dummies
Amithap Krishnan
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
Global Business Events
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
IT Network marcus evans
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
 
Intelligence-led Cybersecurity
Intelligence-led Cybersecurity Intelligence-led Cybersecurity
Intelligence-led Cybersecurity
Phil Huggins FBCS CITP
 
Prinya acis slide for swpark - it & information security human resource deve...
Prinya acis slide for swpark  - it & information security human resource deve...Prinya acis slide for swpark  - it & information security human resource deve...
Prinya acis slide for swpark - it & information security human resource deve...
TISA
 

What's hot (20)

Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacks
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information Challenge
 
Axoss Security Awareness Services
Axoss Security Awareness ServicesAxoss Security Awareness Services
Axoss Security Awareness Services
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk Assessments
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
pci compliance for dummies
pci compliance for dummiespci compliance for dummies
pci compliance for dummies
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Intelligence-led Cybersecurity
Intelligence-led Cybersecurity Intelligence-led Cybersecurity
Intelligence-led Cybersecurity
 
Prinya acis slide for swpark - it & information security human resource deve...
Prinya acis slide for swpark  - it & information security human resource deve...Prinya acis slide for swpark  - it & information security human resource deve...
Prinya acis slide for swpark - it & information security human resource deve...
 

Viewers also liked

Security Digital Connect
Security Digital ConnectSecurity Digital Connect
Security Digital Connect
Grafic.guru
 
Assembly Programme
Assembly ProgrammeAssembly Programme
Assembly Programme
Pere Eurotopia
 
Personalization With WordPress - Interactive Strategies 2016
Personalization With WordPress - Interactive Strategies 2016Personalization With WordPress - Interactive Strategies 2016
Personalization With WordPress - Interactive Strategies 2016
WP Engine
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
F-Secure Corporation
 
The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
Today's Security Threat Landscape
Today's Security Threat LandscapeToday's Security Threat Landscape
Today's Security Threat Landscape
WP Engine
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Haris Tahir
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
F-Secure Corporation
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
Radware
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trends
Sophos Benelux
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
F-Secure Corporation
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
IBM Sverige
 

Viewers also liked (12)

Security Digital Connect
Security Digital ConnectSecurity Digital Connect
Security Digital Connect
 
Assembly Programme
Assembly ProgrammeAssembly Programme
Assembly Programme
 
Personalization With WordPress - Interactive Strategies 2016
Personalization With WordPress - Interactive Strategies 2016Personalization With WordPress - Interactive Strategies 2016
Personalization With WordPress - Interactive Strategies 2016
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 
Today's Security Threat Landscape
Today's Security Threat LandscapeToday's Security Threat Landscape
Today's Security Threat Landscape
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
IT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trendsIT Security landscape and the latest threats and trends
IT Security landscape and the latest threats and trends
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
 

Similar to CBI Threat Landscape Webinar

APT Webinar
APT WebinarAPT Webinar
APT Webinar
Joseph Schorr
 
Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11
Joseph Schorr
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
Interop
 
Spear Phishing Defense
Spear Phishing DefenseSpear Phishing Defense
Spear Phishing Defense
Joseph Schorr
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
Jorge Sebastiao
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
Antonio Fontes
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
wardell henley
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
OracleIDM
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
Jason Clark
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
Matthew Rosenquist
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
tsaiblake
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
Dell EMC World
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
Julius Clark, CISSP, CISA
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
Julius Clark, CISSP, CISA
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
David Spinks
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
Symosis Security (Previously C-Level Security)
 

Similar to CBI Threat Landscape Webinar (20)

APT Webinar
APT WebinarAPT Webinar
APT Webinar
 
Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11Security awarenesspreso draft-v-11
Security awarenesspreso draft-v-11
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Spear Phishing Defense
Spear Phishing DefenseSpear Phishing Defense
Spear Phishing Defense
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 

Recently uploaded

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 

Recently uploaded (20)

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 

CBI Threat Landscape Webinar

  • 1. THREAT LANDSCAPE Q4 2011 Joe Schorr Practice Manager Enterprise Security 1 800.747.8585 | help@cbihome.com
  • 2. CBI Introduction Information Technology and Security Solutions Provider • Symantec Partner of the Year, Finalist • Symantec Platinum Partner • Globally capable, superior technical service Experienced Professionals • Operating for 20 years serving more than 500 clients world wide. • Broad customer base ranging from mid-size to Fortune 100 Experienced in Variety of Industries • Healthcare • Government • Banking & Financial Services • Legal • Manufacturing • Retail • Education 2 2 800.747.8585 | help@cbihome.com
  • 3. 2011 Services Strategy Enterprise Server Endpoint Datacenter IT GRC Security Management Management Management 3 3 800.747.8585 | help@cbihome.com
  • 4. Agenda Key Security Trends Threat Landscape IT and InfoSec Evolution Security Solutions 4 800.747.8585 | help@cbihome.com
  • 5. Key Security Trends CHALLENGING THREAT LANDSCAPE MALICIOUS INSIDERS TARGETED ATTACKS INCREASING EVOLVING COMPLEXITY INCREASING FINANCIAL INFRASTRUCTURE AND BRAND RISK DATA GROWTH COMPLIANCE REQUIREMENTS MOBILE VIRTUALIZATION VENDOR COMPLEXITY CLOUD 5 800.747.8585 | help@cbihome.com
  • 6. The New Threat Landscape  Targeted Attacks  Cyber Flash Mob  Cybercrime The evolved insider  threat  What’s next? 6 800.747.8585 | help@cbihome.com
  • 7. Targeted Attacks 7 800.747.8585 | help@cbihome.com
  • 8. Hacktivism and the Cyber Flash Mob 8 800.747.8585 | help@cbihome.com
  • 9. Cybercrime The world's most popular open source database 9 800.747.8585 | help@cbihome.com
  • 10. Cyber-espionage A picture of the hacking software shown during the Chinese military program. The large writing at the top says "Select Attack Target." Next, the user choose an IP address to attack from (it belongs to an American university). The drop-down box is a list of Falun Gong websites, while the button on the left says "Attack." 10 800.747.8585 | help@cbihome.com
  • 11. Evolution of the insider threat + = 11 800.747.8585 | help@cbihome.com
  • 12. What’s next? •Blended weaponized STUXNET clones •Endpoint Compromise •CA Attacks •SSL > TLS 12 800.747.8585 | help@cbihome.com
  • 13. IT Must Evolve to Meet New Demands System-Centric Information-Centric • Data: Centralized, • Data: Distributed, structured unstructured • Infrastructure: Physical • Infrastructure: Physical, virtual, cloud, mobile • IT focus: Systems tasks outsourced • IT Focus: Information 13 13 800.747.8585 | help@cbihome.com
  • 14. Our Information Centric Approach RISK Policy PHYSICAL Identity Compliance VIRTUAL Remediate Governance Manage Risk CLOUD Store MOBILE Manage INFORMATION Protect Recover Infrastructure Intelligence COST VALUE Classify Discover Ownership Assess 14 14 800.747.8585 | help@cbihome.com
  • 15. Addressing Security Challenges at Each Layer GOVERNANCE INTELLIGENCE INFRASTRUCTURE Policy Driven and Information and Identity Well Managed and Risk Based Centric Secure • Develop and enforce policies • Classify critical data • Protect against customized targeted attacks • Identify and authenticate • Discover where data is • Secure virtual and cloud- based environments • Assess against policies • Apply encryption • Manage and secure data • Prioritize remediation based • Monitor threats to data on mobile devices on risk • Deliver multi-level reports to manage IT risks 15 15 800.747.8585 | help@cbihome.com
  • 16. Symantec Security Solutions GOVERNANCE Develop Policies, Manage Risk Control Compliance Suite Authenticate Identities VeriSign™ Identity & Authentication INTELLIGENCE Protect the Information Data Loss Prevention Suite & Encryption Identity Threats Global Intelligence Network & Managed Security Services INFRASTRUCTURE Manage Systems IT Management Suite Protect the Infrastructure Symantec Protection Suite Cloud Symantec.Cloud 1 16 800.747.8585 | help@cbihome.com 6
  • 17. Why Symantec for Enterprise Security? We protect 1 billion systems around the world Market share Leader # in 8 security segments Twice The market share of next largest competitor in 3 of the 8 segments Gartner MQ Leader in 6 of 6 security segments The Largest IT Security Company in the world 17 17 800.747.8585 | help@cbihome.com
  • 18. Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland Reading, England Tokyo, Japan San Francisco, CA Mountain View, CA Austin, TX Chengdu, China Alexandria, VA Culver City, CA Taipei, Taiwan Chennai, India Pune, India Chennai, India Sydney, Australia Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid Detection Attack Activity Malware Intelligence Vulnerabilities Spam/Phishing • 240,000 sensors • 150M client, server, • 35,000+ vulnerabilities • 5M decoy accounts • 200+ countries and gateways monitored • 11,000 vendors • 8B+ email messages/day territories • Global coverage • 80,000 technologies • 1B+ web requests/day Preemptive Security Alerts Information Protection Threat Triggered Actions 18 800.747.8585 | help@cbihome.com
  • 19. Next Steps Security and Advisory Assessments – In-depth, consultative engagements – Evaluate and improve your overall security program – Address specific concerns (e.g. PCI/ mobile security issues) 19 19 800.747.8585 | help@cbihome.com
  • 20. Thank You Thank You! Joe Schorr jschorr@cbihome.com @JoeSchorr 20 800.747.8585 | help@cbihome.com