SlideShare a Scribd company logo
1 of 10
TOP 5 SECURITY PREDICTIONS
2016 FOR EMEA
Jens Christian Høy Monrad
Global Intelligence Liaison - EMEA
FireEye
/ EMEA Executive Perspective
1. Leadership Cyber Security Consciousness
2. Governments Investment
3. EU Data Privacy & Protection
4. Legitimate analytic tools misuse
5. Digital transformation challenges
1 / Boards get onboard
 Leadership become cyber security
conscious
 Boardrooms will review their cyber
security strategy
2 / Governments will be challenged
 Europe´s governments will devote
more resources to boost capabilities
to tackle cyber threats
 Investment in training for the next
generation of cyber security
professionals is a must
3 / EU Data Privacy & Protection
 EU General Data Protection Regulations
 Legal obligations and reporting requirements
 Harmonised enforcement
4 / Increased usage of legitimate tools in cyber attacks
 Advanced groups will camouflage their activities
amongst legitimate web traffic
 Legitimate analytics tools and apps will be exploited
5 / Digitalisation will leave security behind
 Increased digitalisation and e-gov infrastructure
- pace of growth will potentially grow faster than security
 Potential lack of data classification will
complicate investigations and extend time
between discovery and recovery from breaches.
/ Wait! There Is More To Expect
1. Disruption leads to losses
2. ICS - Infrastructures weak link
3. The Internet of Things broadens the attack surface
4. New Payment Systems, new Threats
5. Apple in the crosshairs
TECHNOLOGY
IDENTIFY KNOWN, UNKNOWN, AND NON MALWARE
BASED THREATS
INTEGRATED PROTECTION ACROSS ALL MAJOR
ATTACK VECTORS
INVESTIGATION TOOLS TO SPEED RESPONSE
EXPERTISE
TRAINED SECURITY INCIDENT RESPONDERS
EXPERIENCE WITH ADVANCED ATTACKERS
UNDERSTAND THE BUSINESS IMPLICATIONS
INTELLIGENCE
FRONT LINE INTEL FROM INCIDENT FORENSICS
NETWORK & ENDPOINT SENSORS
MALWARE INTEL
THREAT ACTOR PROFILES
LOCAL INTEL ON ENCOUNTERED THREATS
/ Adaptive Defense for a changing world
YOU MIGHT ALSO LIKE…
REPORT:
Looking Forward:
The 2016 Security Landscape in EMEA
Click to Download the Special Report >

More Related Content

Viewers also liked

Viewers also liked (10)

The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigation
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Securing your Rails application
Securing your Rails applicationSecuring your Rails application
Securing your Rails application
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 

More from FireEye, Inc.

More from FireEye, Inc. (11)

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

FireEye EMEA Security Predictions 2016

  • 1. TOP 5 SECURITY PREDICTIONS 2016 FOR EMEA Jens Christian Høy Monrad Global Intelligence Liaison - EMEA FireEye
  • 2. / EMEA Executive Perspective 1. Leadership Cyber Security Consciousness 2. Governments Investment 3. EU Data Privacy & Protection 4. Legitimate analytic tools misuse 5. Digital transformation challenges
  • 3. 1 / Boards get onboard  Leadership become cyber security conscious  Boardrooms will review their cyber security strategy
  • 4. 2 / Governments will be challenged  Europe´s governments will devote more resources to boost capabilities to tackle cyber threats  Investment in training for the next generation of cyber security professionals is a must
  • 5. 3 / EU Data Privacy & Protection  EU General Data Protection Regulations  Legal obligations and reporting requirements  Harmonised enforcement
  • 6. 4 / Increased usage of legitimate tools in cyber attacks  Advanced groups will camouflage their activities amongst legitimate web traffic  Legitimate analytics tools and apps will be exploited
  • 7. 5 / Digitalisation will leave security behind  Increased digitalisation and e-gov infrastructure - pace of growth will potentially grow faster than security  Potential lack of data classification will complicate investigations and extend time between discovery and recovery from breaches.
  • 8. / Wait! There Is More To Expect 1. Disruption leads to losses 2. ICS - Infrastructures weak link 3. The Internet of Things broadens the attack surface 4. New Payment Systems, new Threats 5. Apple in the crosshairs
  • 9. TECHNOLOGY IDENTIFY KNOWN, UNKNOWN, AND NON MALWARE BASED THREATS INTEGRATED PROTECTION ACROSS ALL MAJOR ATTACK VECTORS INVESTIGATION TOOLS TO SPEED RESPONSE EXPERTISE TRAINED SECURITY INCIDENT RESPONDERS EXPERIENCE WITH ADVANCED ATTACKERS UNDERSTAND THE BUSINESS IMPLICATIONS INTELLIGENCE FRONT LINE INTEL FROM INCIDENT FORENSICS NETWORK & ENDPOINT SENSORS MALWARE INTEL THREAT ACTOR PROFILES LOCAL INTEL ON ENCOUNTERED THREATS / Adaptive Defense for a changing world
  • 10. YOU MIGHT ALSO LIKE… REPORT: Looking Forward: The 2016 Security Landscape in EMEA Click to Download the Special Report >