ISO & SECURITY MASHUP Seminar: Organized by
Asian Intelligent Information Technology Co., Ltd. &
E-Cqurity (Thailand) Co., Ltd.




                                     IT Security
                                    Trends 2013


Assoc. Prof. Dr. Thanachart Numnonda
Executive Director
IMC Institute
21 January 2013
Gartner Top 10 Strategic Technology Trends
           2012                             2013
Media tablets and beyond             Mobile Device Battles
Mobile-centric applications and      Mobile Applications and HTML5
interfaces                           Personal Cloud
Social &contextual user experience   Enterprise App Stores
Application stores and marketplace   The Internet of Things
The Internet of everything           Hybrid IT and Cloud Computing
Next-generation analytics            Strategic Big Data
Big data                             Actionable Analytics
In-memory computing                  In Memory Computing
Extreme low-energy servers           Integrated Ecosystems
Cloud computing
                                                                     2
Cloud Computing       Mobile Computing




Social Technologies       Information    3
Bring Your Own Devices (BYOD)




                                4
Public Personal Cloud




                        5
“Social computing is moving from
being just on the outside of the organization
to being at the core of business operations.”


Peter Sondergaard, senior vice president at Gartner, 2012




                                                            6
“Big data currently has the most significant impact
 in social network analysis and content analytics
      with 45% of new spending each year.”


                    Gartner, 2012




                                                      7
Sign of the Times

1995: Employee Car

2005: Employee Cell Phone

2015: Employee Computer / Devices




                                    8
Mobile in Enterprise

Gartner forecasts that in 2016, half of all non-PC
devices will be purchased by employees. By the end
of the decade, half of all devices in business will be
purchased by employees.
By 2016, 60% of large enterprises will implement
limited access network zones to limit the connectivity
of personally owned mobile devices.
Gartner predicts that through 2017, 90% of
enterprises will have two or more mobile operating
systems to support.
                                                         9
Security Trends

  Security investments are going to dramatically
  increase. An already large security market is about to
  get much bigger, growing by 56% from current levels
  in five years time, while cloud security will almost
  triple.
  More than 50% of firms currently providing identity
  access management as a service (IAMaaS) and
  cloud-based IAM solutions will be acquired by larger
  service providers by year-end 2015.

                                                           10
Source :http://www.networkworld.com/
Security Trends
  Through 2013, 80% of cloud security incidents will be
  due to administrative error by cloud service providers
  or user management of cloud services.
  For low-security environments, or for workloads that
  have simple security requirements, relying on the
  security built into structure or into the public cloud
  service will be good enough
  At the high end, security will be kept separate from
  private or public cloud infrastructure -- just as we did
  when internal networks were virtualized
                                                             11
Source :http://www.networkworld.com/
Security Trends
  The vast middle will compromise and run security
  workloads in the private cloud and public cloud
  environments.
  There is an urgent need for companies to separate
  personal and business operations on consumer
  smartphones and tablets (both company- and user-
  owned)




                                                      12
Source http://www.networkworld.com/
Seven Top Security Trends
        For 2013




                            13
Mainstream Cloud and Mobile
          Adoption Seeks Security




                                         14
Source http://www.informationweek.com/
Businesses Begin Sandboxing
              Smartphone Apps




                                         15
Source http://www.informationweek.com/
Cloud Offers Unprecedented
                Attack Strength




                                         16
Source http://www.informationweek.com/
Post-Flashback, Cross-Platform
              Attacks Increase




                                         17
Source http://www.informationweek.com/
Destructive Malware Targets Critical
              Infrastructure




                                          18
Source http://www.informationweek.com/
Hackers Target QR Codes, TecTiles




                                         19
Source http://www.informationweek.com/
Digital Wallets Become
                Cybercrime Targets




                                         20
Source http://www.informationweek.com/
Summary

Mega IT Trends : Cloud Computing, Mobile
Technology, Social Technology and Information.
Enterprise IT Impact: BYOD, Personal Cloud,
Social Enterprise.
7 Top IT Security Trends: Mostly based on CSMI:
 – Cloud Security, Mobile Security, Cross
   Platform, Mobile Wallet, QR Code, Critical
   Infrastructure

                                                  21
Thank you

thanachart@imcstitute.com
www.facebook.com/imcinstitute
www.slideshare.net/imcinstitute
                                  22

IT Security Trends 2013

  • 1.
    ISO & SECURITYMASHUP Seminar: Organized by Asian Intelligent Information Technology Co., Ltd. & E-Cqurity (Thailand) Co., Ltd. IT Security Trends 2013 Assoc. Prof. Dr. Thanachart Numnonda Executive Director IMC Institute 21 January 2013
  • 2.
    Gartner Top 10Strategic Technology Trends 2012 2013 Media tablets and beyond Mobile Device Battles Mobile-centric applications and Mobile Applications and HTML5 interfaces Personal Cloud Social &contextual user experience Enterprise App Stores Application stores and marketplace The Internet of Things The Internet of everything Hybrid IT and Cloud Computing Next-generation analytics Strategic Big Data Big data Actionable Analytics In-memory computing In Memory Computing Extreme low-energy servers Integrated Ecosystems Cloud computing 2
  • 3.
    Cloud Computing Mobile Computing Social Technologies Information 3
  • 4.
    Bring Your OwnDevices (BYOD) 4
  • 5.
  • 6.
    “Social computing ismoving from being just on the outside of the organization to being at the core of business operations.” Peter Sondergaard, senior vice president at Gartner, 2012 6
  • 7.
    “Big data currentlyhas the most significant impact in social network analysis and content analytics with 45% of new spending each year.” Gartner, 2012 7
  • 8.
    Sign of theTimes 1995: Employee Car 2005: Employee Cell Phone 2015: Employee Computer / Devices 8
  • 9.
    Mobile in Enterprise Gartnerforecasts that in 2016, half of all non-PC devices will be purchased by employees. By the end of the decade, half of all devices in business will be purchased by employees. By 2016, 60% of large enterprises will implement limited access network zones to limit the connectivity of personally owned mobile devices. Gartner predicts that through 2017, 90% of enterprises will have two or more mobile operating systems to support. 9
  • 10.
    Security Trends Security investments are going to dramatically increase. An already large security market is about to get much bigger, growing by 56% from current levels in five years time, while cloud security will almost triple. More than 50% of firms currently providing identity access management as a service (IAMaaS) and cloud-based IAM solutions will be acquired by larger service providers by year-end 2015. 10 Source :http://www.networkworld.com/
  • 11.
    Security Trends Through 2013, 80% of cloud security incidents will be due to administrative error by cloud service providers or user management of cloud services. For low-security environments, or for workloads that have simple security requirements, relying on the security built into structure or into the public cloud service will be good enough At the high end, security will be kept separate from private or public cloud infrastructure -- just as we did when internal networks were virtualized 11 Source :http://www.networkworld.com/
  • 12.
    Security Trends The vast middle will compromise and run security workloads in the private cloud and public cloud environments. There is an urgent need for companies to separate personal and business operations on consumer smartphones and tablets (both company- and user- owned) 12 Source http://www.networkworld.com/
  • 13.
    Seven Top SecurityTrends For 2013 13
  • 14.
    Mainstream Cloud andMobile Adoption Seeks Security 14 Source http://www.informationweek.com/
  • 15.
    Businesses Begin Sandboxing Smartphone Apps 15 Source http://www.informationweek.com/
  • 16.
    Cloud Offers Unprecedented Attack Strength 16 Source http://www.informationweek.com/
  • 17.
    Post-Flashback, Cross-Platform Attacks Increase 17 Source http://www.informationweek.com/
  • 18.
    Destructive Malware TargetsCritical Infrastructure 18 Source http://www.informationweek.com/
  • 19.
    Hackers Target QRCodes, TecTiles 19 Source http://www.informationweek.com/
  • 20.
    Digital Wallets Become Cybercrime Targets 20 Source http://www.informationweek.com/
  • 21.
    Summary Mega IT Trends: Cloud Computing, Mobile Technology, Social Technology and Information. Enterprise IT Impact: BYOD, Personal Cloud, Social Enterprise. 7 Top IT Security Trends: Mostly based on CSMI: – Cloud Security, Mobile Security, Cross Platform, Mobile Wallet, QR Code, Critical Infrastructure 21
  • 22.