SlideShare a Scribd company logo
„Today’s Top IT Security trends“



Dalibor Ratković - Head of ICT departments
Hvala Vam na pažnji!
             OSVRT O ČEMU SMO PRIČALI 2011




                                  www.telegroup‐ltd.com
Hvala Vam na pažnji!
             OSVRT O ČEMU SMO PRIČALI 2011




                                  www.telegroup‐ltd.com
Hvala Vam na pažnji!
             OSVRT O ČEMU SMO PRIČALI 2011




                                  www.telegroup‐ltd.com
2012 – Žašto je Security tržište toliko dinamičnoa
Izvor informacija
Šta se dešavalo u 2012 - Flame worm
Flame malware - The biggest? The baddest? Costs over 100 M$


Once a system is infected, Flame begins a
complex set of operations, including sniffing the
network traffic, taking screenshots, recording
audio conversations, intercepting the keyboard,
and so on. All this data is available to the
operators through the link to Flame’s
command-and-control servers. 20 MB Maj 2012
Flame worm
Šta se dešavalo u 2012 – Gauss Trojan

State-sponsored Trojan 'Gauss' targets Lebanese banks and user details


 Named ‘Gauss', it claimed that
 this is a complex, nation-state
 sponsored cyber espionage
 toolkit and its online banking
 Trojan functionality has not been
 found in any previously known
 cyber weapons. Avg 2012
Šta se dešavalo u 2012 – Mini Flame


MiniFlame is different from Flame
and Gauss in that the number of
infections is significantly smaller.
While we estimate the total number
of Flame/Gauss victims at no less
than 10,000 systems, MiniFlame has
been detected in just a few dozen
systems in Western Asia. 16.
October
Obama, Romney avoid talking cyber security at
debate
Did Chinese hackers access the White House's
nuclear secrets?

 Failure of the Obama administration to press China on its 
 persistent cyber attacks.
 The official said: “In this instance the attack was identified, 
 the system was isolated, and there is no indication 
 whatsoever that any exfiltration of data took place.”
Šta se dešavalo u 2012

  SCADA-based water system hacked in USA
• 21.11.2011 Reports emerged at the end of last
  week that a SCADA-based water system in the
  US had been hacked.
• Blog posts confirm that "there was damage – the
  SCADA system was powered on and off, burning
  out a water pump".
• Location - in Springfield, Illinois
Šta se dešavalo u 2012 - Conficker worm is still
actively infecting users

Microsoft announced a $250,000 reward for information that
resulted in the arrest and conviction of those responsible for the
Conficker malware in 2009

Conficker worm first appeared on 21st November 2008
Šta se dešavalo u 2012
  More malware found hosted in Google's official Android 
  market
Android.Dropdialer, a trojan that racks up costly charges from 
forced calls made to premium phone numbers
ŠTA ĆE BITI OBAVEZA IT MENADŽERA U
        NAREDNOM PERIODU
Takeaways for 2012 and 2013




                              www.awesomebackgrounds.com
Bring Your Own Device!
BYOD definitions
 BYOD is short for bring your own device.
 Bring Your Own Device (BYOD) describes the recent trend of 
 employees bringing personally‐owned mobile devices, such 
 as smartphones, laptops and PDAs, to their place of work, 
 and using those devices to access privileged company 
 resources such as email, file servers, and database
Bring Your Own Device - BYOD
 always‐on, always‐connected gives way to "hyperconneted„
 Mobile malware is on the rise ‐ Malware targeting mobile 
 devices will continue to increase, and enterprises will wrestle 
 with how to protect users. Obvious targets will be 
 smartphones and tablets.
 By 2018, 70% of mobile professionals will conduct all of their 
 work on personal smart devices. 
Hyper-connectivity leads to growing identity and
privacy challenges
 In today’s business 
 environment, more users 
 need to legitimately access 
 more data from more places.
 The IAM Market Evolution to 
 Cloud Computing  ‐ By the 
 end of 2014, IDaaS will 
 account for 25% of all new 
 IAM sales, compared with less 
 than 5% in 2012. 
New concerns will surface about IPv6
  In future, many operations 
 will start migrating to these 
 newer versions, generating a 
 new round of vulnerabilities 
 and exploits.
 In addition, the other two 
 fundamental mechanisms of 
 the Internet ‐‐ border 
 gateway protocol and domain 
 name system (DNS)  ‐‐ also 
 now offer a next‐generation 
 version.
Information Security Risk Assessment
This risk management will 
explore each phase of the IT 
security risk management 
lifecycle, focusing on techniques 
that should be used to properly 
identify, articulate, assess, 
mitigate, and report on 
information risk.
Big Data will get bigger, and so will security needs
Securing Public/Private Cloud
Izgled novog modernog sistema zaštite
The challenge is to spend money wisely
Security Partneri
Telegroup Partners:
Te
Security Partneri
Partners:
www.telegroup.ba
                       www.telegroup-ltd.com




                                       www.telegroup-bg.com




HVALA VAM NA PAŽNJI!

More Related Content

What's hot

New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
Zdravko Stoychev, CISM, CRISC
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
Mohamed N. El-Guindy
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Software piracy
Software piracySoftware piracy
Software piracy
K. M. Rokonuzzaman
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
Spire Research and Consulting
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
- Mark - Fullbright
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
Seqrite
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
Seqrite
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
Cigniti Technologies Ltd
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
 
Latin America’s Internet Usage Increases
Latin America’s Internet Usage IncreasesLatin America’s Internet Usage Increases
Latin America’s Internet Usage Increases
Lorence Fogelman
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
JuanMiguelVelascoWeb
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Ekonomikas ministrija
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
the_ro0t
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
Kavita Rastogi
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec
 

What's hot (19)

New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Software piracy
Software piracySoftware piracy
Software piracy
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Latin America’s Internet Usage Increases
Latin America’s Internet Usage IncreasesLatin America’s Internet Usage Increases
Latin America’s Internet Usage Increases
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 

Viewers also liked

музей
музеймузей
музейsch129
 
UA - analiZatoR - услуги Google Analytics
UA - analiZatoR - услуги Google AnalyticsUA - analiZatoR - услуги Google Analytics
UA - analiZatoR - услуги Google Analytics
Sergii Alekseev
 
Ua-analiZatoR (бесплатный пакет) СТАРТ
Ua-analiZatoR (бесплатный пакет) СТАРТUa-analiZatoR (бесплатный пакет) СТАРТ
Ua-analiZatoR (бесплатный пакет) СТАРТ
Sergii Alekseev
 
La taula rodona
La taula rodonaLa taula rodona
La taula rodonaPerramon
 
Diversity Committee Brochure designed by Keith Chrisman
Diversity Committee Brochure designed by Keith ChrismanDiversity Committee Brochure designed by Keith Chrisman
Diversity Committee Brochure designed by Keith ChrismanKeith Chrisman
 
Review + Assess: Luke Havergal, Richard Cory, Richard Bone
Review + Assess: Luke Havergal, Richard Cory, Richard BoneReview + Assess: Luke Havergal, Richard Cory, Richard Bone
Review + Assess: Luke Havergal, Richard Cory, Richard Bone
Keith Chrisman
 
Richard Bone
Richard BoneRichard Bone
Richard Bone
Keith Chrisman
 
SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015
Muhammed Thwayyib
 

Viewers also liked (9)

музей
музеймузей
музей
 
UA - analiZatoR - услуги Google Analytics
UA - analiZatoR - услуги Google AnalyticsUA - analiZatoR - услуги Google Analytics
UA - analiZatoR - услуги Google Analytics
 
Ua-analiZatoR (бесплатный пакет) СТАРТ
Ua-analiZatoR (бесплатный пакет) СТАРТUa-analiZatoR (бесплатный пакет) СТАРТ
Ua-analiZatoR (бесплатный пакет) СТАРТ
 
La taula rodona
La taula rodonaLa taula rodona
La taula rodona
 
Alexy1
Alexy1Alexy1
Alexy1
 
Diversity Committee Brochure designed by Keith Chrisman
Diversity Committee Brochure designed by Keith ChrismanDiversity Committee Brochure designed by Keith Chrisman
Diversity Committee Brochure designed by Keith Chrisman
 
Review + Assess: Luke Havergal, Richard Cory, Richard Bone
Review + Assess: Luke Havergal, Richard Cory, Richard BoneReview + Assess: Luke Havergal, Richard Cory, Richard Bone
Review + Assess: Luke Havergal, Richard Cory, Richard Bone
 
Richard Bone
Richard BoneRichard Bone
Richard Bone
 
SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015
 

Similar to Infosecurity 2012 Banja Luka

Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
Netop
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
Kim Jensen
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
Комсс Файквэе
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
XNSPY
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
Felipe Prado
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
MAXfocus
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Alisha Deboer
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
RapidSSLOnline.com
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
Blueliv
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
EMC
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
Karim Shaikh
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
Infinigate Group
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
Ayu Anita
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
Imperva
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
ManviShukla4
 

Similar to Infosecurity 2012 Banja Luka (20)

Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Infosecurity 2012 Banja Luka

  • 1.
  • 2. „Today’s Top IT Security trends“ Dalibor Ratković - Head of ICT departments
  • 3. Hvala Vam na pažnji! OSVRT O ČEMU SMO PRIČALI 2011 www.telegroup‐ltd.com
  • 4. Hvala Vam na pažnji! OSVRT O ČEMU SMO PRIČALI 2011 www.telegroup‐ltd.com
  • 5. Hvala Vam na pažnji! OSVRT O ČEMU SMO PRIČALI 2011 www.telegroup‐ltd.com
  • 6. 2012 – Žašto je Security tržište toliko dinamičnoa
  • 8. Šta se dešavalo u 2012 - Flame worm Flame malware - The biggest? The baddest? Costs over 100 M$ Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations, intercepting the keyboard, and so on. All this data is available to the operators through the link to Flame’s command-and-control servers. 20 MB Maj 2012
  • 10. Šta se dešavalo u 2012 – Gauss Trojan State-sponsored Trojan 'Gauss' targets Lebanese banks and user details Named ‘Gauss', it claimed that this is a complex, nation-state sponsored cyber espionage toolkit and its online banking Trojan functionality has not been found in any previously known cyber weapons. Avg 2012
  • 11. Šta se dešavalo u 2012 – Mini Flame MiniFlame is different from Flame and Gauss in that the number of infections is significantly smaller. While we estimate the total number of Flame/Gauss victims at no less than 10,000 systems, MiniFlame has been detected in just a few dozen systems in Western Asia. 16. October
  • 12. Obama, Romney avoid talking cyber security at debate
  • 13. Did Chinese hackers access the White House's nuclear secrets? Failure of the Obama administration to press China on its  persistent cyber attacks. The official said: “In this instance the attack was identified,  the system was isolated, and there is no indication  whatsoever that any exfiltration of data took place.”
  • 14. Šta se dešavalo u 2012 SCADA-based water system hacked in USA • 21.11.2011 Reports emerged at the end of last week that a SCADA-based water system in the US had been hacked. • Blog posts confirm that "there was damage – the SCADA system was powered on and off, burning out a water pump". • Location - in Springfield, Illinois
  • 15. Šta se dešavalo u 2012 - Conficker worm is still actively infecting users Microsoft announced a $250,000 reward for information that resulted in the arrest and conviction of those responsible for the Conficker malware in 2009 Conficker worm first appeared on 21st November 2008
  • 16. Šta se dešavalo u 2012 More malware found hosted in Google's official Android  market Android.Dropdialer, a trojan that racks up costly charges from  forced calls made to premium phone numbers
  • 17. ŠTA ĆE BITI OBAVEZA IT MENADŽERA U NAREDNOM PERIODU
  • 18. Takeaways for 2012 and 2013 www.awesomebackgrounds.com
  • 19. Bring Your Own Device!
  • 20. BYOD definitions BYOD is short for bring your own device. Bring Your Own Device (BYOD) describes the recent trend of  employees bringing personally‐owned mobile devices, such  as smartphones, laptops and PDAs, to their place of work,  and using those devices to access privileged company  resources such as email, file servers, and database
  • 21. Bring Your Own Device - BYOD always‐on, always‐connected gives way to "hyperconneted„ Mobile malware is on the rise ‐ Malware targeting mobile  devices will continue to increase, and enterprises will wrestle  with how to protect users. Obvious targets will be  smartphones and tablets. By 2018, 70% of mobile professionals will conduct all of their  work on personal smart devices. 
  • 22.
  • 23. Hyper-connectivity leads to growing identity and privacy challenges In today’s business  environment, more users  need to legitimately access  more data from more places. The IAM Market Evolution to  Cloud Computing  ‐ By the  end of 2014, IDaaS will  account for 25% of all new  IAM sales, compared with less  than 5% in 2012. 
  • 24. New concerns will surface about IPv6 In future, many operations  will start migrating to these  newer versions, generating a  new round of vulnerabilities  and exploits. In addition, the other two  fundamental mechanisms of  the Internet ‐‐ border  gateway protocol and domain  name system (DNS)  ‐‐ also  now offer a next‐generation  version.
  • 25. Information Security Risk Assessment This risk management will  explore each phase of the IT  security risk management  lifecycle, focusing on techniques  that should be used to properly  identify, articulate, assess,  mitigate, and report on  information risk.
  • 26. Big Data will get bigger, and so will security needs
  • 28. Izgled novog modernog sistema zaštite
  • 29.
  • 30. The challenge is to spend money wisely
  • 33.
  • 34. www.telegroup.ba www.telegroup-ltd.com www.telegroup-bg.com HVALA VAM NA PAŽNJI!