SlideShare a Scribd company logo
1 of 45
Download to read offline
Top Security
                              Threats
                             for 2011
Thursday, March 31, 2011
Presenter

                                Eric Kitchens, CISSP/CISA
                                  eric@thegarlandgroup.net




Thursday, March 31, 2011
riskkey.com




                 • IT Audit / Security Testing
                 • Continuous Compliance
                 • Collaboration Consulting




Thursday, March 31, 2011
What Are The
                           Top Security Threats
                                for 2011?


Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.


                       New and emerging threats often are combinations of “old” threats.




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.


                       New and emerging threats often are combinations of “old” threats.


                                         It’s never too late to mitigate.



Thursday, March 31, 2011
Something Old...
                           Threats that have been with us for many years
                              and will be with us for years to come.




Thursday, March 31, 2011
Something Old...
                           Threats that have been with us for many years
                              and will be with us for years to come.


                 • Mobile Devices




Thursday, March 31, 2011
Something Old...
                            Threats that have been with us for many years
                               and will be with us for years to come.


                 • Mobile Devices
                  • Cloud Computing & Virtualization



Thursday, March 31, 2011
Something Old...
                            Threats that have been with us for many years
                               and will be with us for years to come.


                 • Mobile Devices
                  • Cloud Computing & Virtualization
                  • Application Vulnerabilities

Thursday, March 31, 2011
Mobile Devices




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore
           • Merging Business & Personal Use



Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore
           • Merging Business & Personal Use
           • Lost or Stolen Devices & Data

Thursday, March 31, 2011
Cloud Computing




Thursday, March 31, 2011
Cloud Computing

              • Expanding Scope of Virtualization




Thursday, March 31, 2011
Cloud Computing

              • Expanding Scope of Virtualization
              • Outsourced Applications and Services



Thursday, March 31, 2011
Application Vulnerabilities




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing
                  • Application Specific Vulnerabilities are on the Rise




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing
                  • Application Specific Vulnerabilities are on the Rise
                  • Evaluate Automated Patching Tools for All Applications & Systems



Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems




Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats




Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats
              • Hacktivisim



Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats
              • Hacktivisim
              • Cyberterrorism


Thursday, March 31, 2011
Advanced Persistent Threats




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time
                  • Adapts to Defenses and Mitigation Strategies



Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time
                  • Adapts to Defenses and Mitigation Strategies
                  • Baselining and Monitoring are Essential for Defense

Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes
                • Tools are Freely Available to Non-Technical Users



Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes
                • Tools are Freely Available to Non-Technical Users
                • Be Aware of Outsourced Relationships and
                       Higher Risk Customers They Service


Thursday, March 31, 2011
Something Borrowed...




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats
                       • Data Classification and Control



Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats
                       • Data Classification and Control
                       • USB Storage Devices

Thursday, March 31, 2011
Questions & Answers




Thursday, March 31, 2011
Thanks.
                           Email: eric@thegarlandgroup.net

                           Web: http://www.thegarlandgroup.net




Thursday, March 31, 2011

More Related Content

Similar to Garland Group - Top Security Threats of 2011

Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience
Erik Eliason
 
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Seismonaut
 

Similar to Garland Group - Top Security Threats of 2011 (7)

Android Apps Success and Store trend
Android Apps Success and Store trendAndroid Apps Success and Store trend
Android Apps Success and Store trend
 
Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience
 
Critical aspects of digital tools in learning processes during the near future
Critical aspects of digital tools in learning processes  during the near futureCritical aspects of digital tools in learning processes  during the near future
Critical aspects of digital tools in learning processes during the near future
 
Social Media-Interacting With Your Stakeholders
Social Media-Interacting With Your StakeholdersSocial Media-Interacting With Your Stakeholders
Social Media-Interacting With Your Stakeholders
 
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
 
Information Visualization
Information VisualizationInformation Visualization
Information Visualization
 
Social Media Evolved
Social Media EvolvedSocial Media Evolved
Social Media Evolved
 

More from Brad Garland (7)

ICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial ServicesICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial Services
 
Community Is King
Community Is KingCommunity Is King
Community Is King
 
FFIEC Regulatory Training
FFIEC Regulatory TrainingFFIEC Regulatory Training
FFIEC Regulatory Training
 
Next Generation Banking with Generation Y
Next Generation Banking with Generation YNext Generation Banking with Generation Y
Next Generation Banking with Generation Y
 
Banking on Social Media
Banking on Social MediaBanking on Social Media
Banking on Social Media
 
Web2.0 and your Bank - The Consumers
Web2.0 and your Bank - The ConsumersWeb2.0 and your Bank - The Consumers
Web2.0 and your Bank - The Consumers
 
Web 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The TechnologyWeb 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The Technology
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Garland Group - Top Security Threats of 2011

  • 1. Top Security Threats for 2011 Thursday, March 31, 2011
  • 2. Presenter Eric Kitchens, CISSP/CISA eric@thegarlandgroup.net Thursday, March 31, 2011
  • 3. riskkey.com • IT Audit / Security Testing • Continuous Compliance • Collaboration Consulting Thursday, March 31, 2011
  • 4. What Are The Top Security Threats for 2011? Thursday, March 31, 2011
  • 5. Something Old, Something New, Something Borrowed... Thursday, March 31, 2011
  • 6. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. Thursday, March 31, 2011
  • 7. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. New and emerging threats often are combinations of “old” threats. Thursday, March 31, 2011
  • 8. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. New and emerging threats often are combinations of “old” threats. It’s never too late to mitigate. Thursday, March 31, 2011
  • 9. Something Old... Threats that have been with us for many years and will be with us for years to come. Thursday, March 31, 2011
  • 10. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices Thursday, March 31, 2011
  • 11. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices • Cloud Computing & Virtualization Thursday, March 31, 2011
  • 12. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices • Cloud Computing & Virtualization • Application Vulnerabilities Thursday, March 31, 2011
  • 14. Mobile Devices • Various Platforms Thursday, March 31, 2011
  • 15. Mobile Devices • Various Platforms • Mal-Ware in the AppStore Thursday, March 31, 2011
  • 16. Mobile Devices • Various Platforms • Mal-Ware in the AppStore • Merging Business & Personal Use Thursday, March 31, 2011
  • 17. Mobile Devices • Various Platforms • Mal-Ware in the AppStore • Merging Business & Personal Use • Lost or Stolen Devices & Data Thursday, March 31, 2011
  • 19. Cloud Computing • Expanding Scope of Virtualization Thursday, March 31, 2011
  • 20. Cloud Computing • Expanding Scope of Virtualization • Outsourced Applications and Services Thursday, March 31, 2011
  • 22. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing Thursday, March 31, 2011
  • 23. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing • Application Specific Vulnerabilities are on the Rise Thursday, March 31, 2011
  • 24. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing • Application Specific Vulnerabilities are on the Rise • Evaluate Automated Patching Tools for All Applications & Systems Thursday, March 31, 2011
  • 25. Something New... Not “new” but emerging and evolving into new problems Thursday, March 31, 2011
  • 26. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats Thursday, March 31, 2011
  • 27. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats • Hacktivisim Thursday, March 31, 2011
  • 28. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats • Hacktivisim • Cyberterrorism Thursday, March 31, 2011
  • 30. Advanced Persistent Threats • Google and RSA Are Recent Examples Thursday, March 31, 2011
  • 31. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time Thursday, March 31, 2011
  • 32. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time • Adapts to Defenses and Mitigation Strategies Thursday, March 31, 2011
  • 33. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time • Adapts to Defenses and Mitigation Strategies • Baselining and Monitoring are Essential for Defense Thursday, March 31, 2011
  • 35. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. Thursday, March 31, 2011
  • 36. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes Thursday, March 31, 2011
  • 37. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes • Tools are Freely Available to Non-Technical Users Thursday, March 31, 2011
  • 38. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes • Tools are Freely Available to Non-Technical Users • Be Aware of Outsourced Relationships and Higher Risk Customers They Service Thursday, March 31, 2011
  • 40. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” Thursday, March 31, 2011
  • 41. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats Thursday, March 31, 2011
  • 42. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats • Data Classification and Control Thursday, March 31, 2011
  • 43. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats • Data Classification and Control • USB Storage Devices Thursday, March 31, 2011
  • 45. Thanks. Email: eric@thegarlandgroup.net Web: http://www.thegarlandgroup.net Thursday, March 31, 2011