SlideShare a Scribd company logo
1 of 12
Download to read offline
Modern IT Security: Risks and Rewards
Kristen Lovejoy, General Manager, IBM Security Services
THE
AVERAGE
COMPANY
FACES

1,574,882
SECURITY EVENTS PER WEEK

#AkamaiEdge

©2013 AKAMAI | FASTER FORWARDTM
TOP FIVE
MOST
ATTACKED
INDUSTRIES
TODAY
Health & Social
Services

#AkamaiEdge

Transportation

Hospitality

Finance &
Insurance

Manufacturing

©2013 AKAMAI | FASTER FORWARDTM
Number of
Attacks
THE AVERAGE
LARGE
COMPANY
MUST FILTER
THROUGH
1,400 CYBER
ATTACKS PER
WEEK

Number of
Incidents

Annual
73,400

Annual
90.2

Monthly
6,100

Monthly
7.51

Weekly
1,400

Weekly
1.7
Security
Intelligence

…TO IDENTIFY THE 1.7 INCIDENTS THAT CAN DO HARM
#AkamaiEdge

©2013 AKAMAI | FASTER FORWARDTM
WHO IS
ATTACKING
YOUR
NETWORKS

#AkamaiEdge

AND WHY?

©2013 AKAMAI | FASTER FORWARDTM
DISTRIBUTED DENIAL OF SERVICE ATTACKS
ARE BEING USED AS A DISTRACTION

#AkamaiEdge

©2013 AKAMAI | FASTER FORWARDTM
There is good news…

%
65

1IBM

#AkamaiEdge

Chief Information Security Officer Assessment, 2012; 2IBM Global Reputational Risk and
IT Study, 2013

of senior executives
are paying more
attention to security
issues and plan to
increase spending

%
66

of companies employ
security threat
intelligence to stay on
top of the changing
risk landscape

©2013 AKAMAI | FASTER FORWARDTM
…and not-so-good news.

%
40

1IBM

#AkamaiEdge

Chief Information Security Officer Assessment, 2012; 2IBM Global Reputational Risk and
IT Study, 2013

of companies employ
security threat
intelligence to stay on top
of the changing risk
landscape

%
18

of companies rate
their ability to
manage IT risk as
very strong

©2013 AKAMAI | FASTER FORWARDTM
‘Concerns relating to managing information risk
are directly related to staffing difficulties’

%
81

‘Staffing challenges will either stay the
same or get worse over the next five to 10
years’

%
25

SKILLS ARE
ALMOST
IMPOSSIBLE
TO FIND

%
86

‘Technical security staff members remain
on the team for three or more years’

THE WORSE
NEWS?

#AkamaiEdge

©2013 AKAMAI | FASTER FORWARDTM
AN END-TO END DDoS
SOLUTION BLENDING
TECHNICAL AND
HUMAN
INTELLIGENCE

#AkamaiEdge

Preparation

Mitigation

Monitoring

Response

Intelligence

©2013 AKAMAI | FASTER FORWARDTM
AROUND-THE-CLOCK
CAPABILITIES,
AROUND THE GLOBE.
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

#AkamaiEdge

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

#AkamaiEdge

©2013 AKAMAI | FASTER FORWARDTM

More Related Content

More from Akamai Technologies

Edge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live DemonstrationEdge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live Demonstration
Akamai Technologies
 

More from Akamai Technologies (20)

应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
 
Chicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWDChicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWD
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden Features
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBay
 
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case StudyEdge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
 
Edge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format TodayEdge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format Today
 
Edge 2014: A Modern Approach to Performance Monitoring
Edge 2014: A Modern Approach to Performance MonitoringEdge 2014: A Modern Approach to Performance Monitoring
Edge 2014: A Modern Approach to Performance Monitoring
 
Edge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live DemonstrationEdge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live Demonstration
 
Key Reasons Customers Choose Akamai
Key Reasons Customers Choose Akamai Key Reasons Customers Choose Akamai
Key Reasons Customers Choose Akamai
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Modern IT Security: Risks and Rewards - Kristin Lovejoy, IBM

  • 1. Modern IT Security: Risks and Rewards Kristen Lovejoy, General Manager, IBM Security Services
  • 2. THE AVERAGE COMPANY FACES 1,574,882 SECURITY EVENTS PER WEEK #AkamaiEdge ©2013 AKAMAI | FASTER FORWARDTM
  • 3. TOP FIVE MOST ATTACKED INDUSTRIES TODAY Health & Social Services #AkamaiEdge Transportation Hospitality Finance & Insurance Manufacturing ©2013 AKAMAI | FASTER FORWARDTM
  • 4. Number of Attacks THE AVERAGE LARGE COMPANY MUST FILTER THROUGH 1,400 CYBER ATTACKS PER WEEK Number of Incidents Annual 73,400 Annual 90.2 Monthly 6,100 Monthly 7.51 Weekly 1,400 Weekly 1.7 Security Intelligence …TO IDENTIFY THE 1.7 INCIDENTS THAT CAN DO HARM #AkamaiEdge ©2013 AKAMAI | FASTER FORWARDTM
  • 6. DISTRIBUTED DENIAL OF SERVICE ATTACKS ARE BEING USED AS A DISTRACTION #AkamaiEdge ©2013 AKAMAI | FASTER FORWARDTM
  • 7. There is good news… % 65 1IBM #AkamaiEdge Chief Information Security Officer Assessment, 2012; 2IBM Global Reputational Risk and IT Study, 2013 of senior executives are paying more attention to security issues and plan to increase spending % 66 of companies employ security threat intelligence to stay on top of the changing risk landscape ©2013 AKAMAI | FASTER FORWARDTM
  • 8. …and not-so-good news. % 40 1IBM #AkamaiEdge Chief Information Security Officer Assessment, 2012; 2IBM Global Reputational Risk and IT Study, 2013 of companies employ security threat intelligence to stay on top of the changing risk landscape % 18 of companies rate their ability to manage IT risk as very strong ©2013 AKAMAI | FASTER FORWARDTM
  • 9. ‘Concerns relating to managing information risk are directly related to staffing difficulties’ % 81 ‘Staffing challenges will either stay the same or get worse over the next five to 10 years’ % 25 SKILLS ARE ALMOST IMPOSSIBLE TO FIND % 86 ‘Technical security staff members remain on the team for three or more years’ THE WORSE NEWS? #AkamaiEdge ©2013 AKAMAI | FASTER FORWARDTM
  • 10. AN END-TO END DDoS SOLUTION BLENDING TECHNICAL AND HUMAN INTELLIGENCE #AkamaiEdge Preparation Mitigation Monitoring Response Intelligence ©2013 AKAMAI | FASTER FORWARDTM
  • 11. AROUND-THE-CLOCK CAPABILITIES, AROUND THE GLOBE. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. #AkamaiEdge ©2013 AKAMAI | FASTER FORWARDTM
  • 12. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. #AkamaiEdge ©2013 AKAMAI | FASTER FORWARDTM