SlideShare a Scribd company logo
1 of 31
Download to read offline
New	
  Security	
  Challenges	
  Facing	
  
Cloud	
  and	
  Mobile	
  Expansion	
  
Juan	
  M.	
  Velasco,	
  
	
  CEO,	
  Aiuken	
  Solu6ons.Spain	
  	
  
Company logos may appear on this title page
01The War of Currents: AC / DC
Cloud Electricity from 1900 to 1930
Nicola
Tesla
Topsy
1903
2
20th Century
19th Century
01 Cloud Introduction– Electricity Cloud
Electricity revolution vs Cloud Revolution
1890 – Anonymous Enterprise:
“Our Business doesn’t need any external current at all,
we are autonomous”
FROM
• No multi-client
• Limited Generation
• No standardization
• High investment required
• Dedicated technical team
required
• Local scope
http://www.ree.es/operacion/curvas_demanda.asp
TO
• Multi-Client
• Standard API (AC/DC – Voltage
110V-220V)
• Pay – per – Use
• 24x7 always on
• Remote management & support
• Unlimited service
• Worldwide service
How to find eficency with IT infrastructures?
IT evolution Cloud as IaaS / SaaS
IT
Infrastructures
Aplications
SW Base & Middleware
IT Equipment
DataCenter
Infrastructures
First Approach to
Cloud
Transformation
Manteinance consolidation
Operations consolidation
Support Considation
Standarazation
Software free
HW Consolidation
Virtualization
Cooling Consolidation
Free Cooling
Cold / Warm corridor
SaaS
IaaS
Services Centers
Private Cloud
(Sharing for Gov
only)
DataCenter
Consolidation
Cloud answer for:
Efficiency?
Standards?
Interoperativity? roll back?
Pricing?
Answers? Security?
SLAs?KPI?
Cloud is NOT a technology is a market transformation
In 2020, people will interact each day with more than 70 devices connected to
Internet. Nowadays we interact with less than 10 devices connected. The
M2M phenomenom will boots Cloud and Internet users and bandwidth use.
From 1 billion users today to 3 billion devices connected in 5 years
Cloud Computing
Market transformation
By 2014 will be more connected devices to Internet than
people on Earth
x5
10/28/13 8
x26
Mobility as an answer for :
Availability
Platforms?
Security?
Standards?
Applications?
BYOD? Backup?
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
Mobile Risk
Fuente: http://searchmobilecomputing.techtarget.com/ (201
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
BYOD `Bring Your Own Device´
BYOD and consumerization, is one based on the desire of
employees to use their own mobile devices (phones,
smartphones, tablets, laptops ...) in the workplace and access to
information from this company, such as the corporate email, DB
or file servers.
It is a reality accepted by IT departments, in the post-pc
According to a survey of CISCO over 90% of CIOs surveyed said
they permit, even doing the "blind eye," the use of mobile devices
owned by employees to access their data.
Of the principals surveyed more than two thirds have overcome
fears this trend and see it as something positive for the
organization.
Yet another study, this time from the company BT, puts out the
lack of vision of the potential risks of this practice on the part of
employees, as only one in four sees risk in using their own
devices, when almost 40% of companies have experienced
security incidents related to this issue.
www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E
BYOD `Bring Your Own Device´
BYOD the New Threat door
ncreased
Mobile+
Cloud
More Users + More Devices + More Services
Reduced Stress =More Capacity + More Control + More Visibility
DDos
¿Donde se para un DDoS?
CLOUD	
  Security	
  concerns	
  
Concerns about Public Cloud (not
private Cloud?)
15
July,5th 1993.THE NEWYORKER
IDENTITY?
Why	
  is	
  this	
  happening?	
  IPv4	
  
Session / Paper Title 1815-16 Oct 2013
Why	
  is	
  this	
  happening?	
  IPv4	
  
Session / Paper Title 1915-16 Oct 2013
Growing	
  of	
  new	
  aAacks	
  and	
  APTs	
  
	
  
•  Number	
  of	
  threaths	
  x5	
  in	
  4	
  years	
  
•  Nature	
  of	
  threats	
  and	
  aHacks	
  change:	
  
–  From	
  general	
  and	
  diverse	
  to	
  persistent,	
  
avanced	
  and	
  oriented	
  
•  Avanced	
  aHacks	
  grow	
  
–  High	
  vic6ms	
  level	
  profile	
  (i.e,	
  RSA;	
  
Symantec,	
  Google)	
  
–  Great	
  variety	
  of	
  new	
  APTs	
  like	
  Aurora	
  
Opera6on,	
  Shady	
  RAT,	
  GhostNet,	
  
Night	
  Dragon,	
  Nitro	
  
“Organizations face an evolving threat scenario that they are ill-prepared to
deal with….advanced threats that have bypassed their traditional security
protection techniques and reside undetected on their systems.”
Gartner, 2012
2004 2006 2008 2010 2012
Advanced
Persistent Threats
Zero-day
Targeted Attacks
Dynamic Trojans
Stealth Bots
Worms
Viruses
Disruption Spyware/
Bots
Cybercrime
Cyber-espionage
and Cybercrime
DamageofAttacks
Source
APT	
  AAacks.	
  AAacks	
  profile	
  has	
  increased	
  
source
APTs,	
  new	
  tools	
  for	
  DDoS	
  /	
  TDoS
Advanced Persistent Threats (APTs) are created by different organizations from
hackers like Lulzsec, Anonymous,etc. Also by Federeal Goverments like CIA,
Mossad, etc.Their main motivation are:
1.  Goverment
2.  Economical
3.  Technical
4.  Military
23
Botnets	
  
Botnet	
  Ecosystem	
  
24
Botnets	
  
The	
  Criminal	
  Opera6ons	
  Team	
  
DDoS	
  the	
  increasing	
  threat,	
  for	
  all	
  Internet	
  Services	
  
Reason	
  1	
  
• Universal	
  
Reason	
  2	
  
• Cheap	
  
Reason	
  3	
  
• Eficiency	
  
Reason	
  4	
  
• No	
  pushment	
  
Reason	
  5	
  
• Big	
  Impact	
  
Reason	
  6	
  
• Easy	
  to	
  replicate	
  
Reason	
  7	
  
• Underes6mate	
  
28
The New Perimeter. Security for and
from Cloud.
•  Cloud	
  must	
  play	
  an	
  
ac6ve	
  defense	
  role	
  
•  Cloud	
  must	
  be	
  an	
  
ac6ve	
  player	
  for	
  the	
  
perimeter	
  defense	
  
•  Cloud	
  can	
  be	
  use	
  
nowadays	
  as	
  an	
  
ac6ve	
  extension	
  of	
  
our	
  security	
  
perimeter	
  
•  Cloud	
  nowadays	
  is	
  
able	
  to	
  provide	
  at	
  
least	
  secure	
  email	
  
and	
  internet	
  access	
  
•  Cloud	
  must	
  provide	
  
ac6ve	
  defense	
  
ACT don’t REACT
29
Email Security
Security	
  Challenges	
  of	
  Email	
  in	
  the	
  Cloud	
  
Conclusion:	
  Secure	
  Cloud+	
  Mobile	
  
Session / Paper Title 3015-16 Oct 2013
Clean Pipes AntiDDoS
SOC
DataCentre
AntiAPTs
ID Mgmt
DNSNAT
IPv6LTE
WAFDPI
31
Juan Miguel Velasco López-Urda
jmvelasco@aiuken.com
CEO Aiuken Solutions

More Related Content

What's hot

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsVertex Holdings
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditingsyrinxtech
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013Wolfgang Kandek
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and LearningCitrix
 

What's hot (19)

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environments
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditing
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
Cyber security colombo meetup
Cyber security colombo meetupCyber security colombo meetup
Cyber security colombo meetup
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 

Viewers also liked

Formato competencias programacion_ii
Formato competencias programacion_iiFormato competencias programacion_ii
Formato competencias programacion_iiErla Hernández
 
6принцип наступності
6принцип наступності6принцип наступності
6принцип наступностіmetodistinf
 
شگفتي هاي سوره اخلاص 1
شگفتي هاي سوره اخلاص 1شگفتي هاي سوره اخلاص 1
شگفتي هاي سوره اخلاص 1Dr Fereidoun Dejahang
 
071 the stars-pulsars-pulsating stars
071 the stars-pulsars-pulsating stars071 the stars-pulsars-pulsating stars
071 the stars-pulsars-pulsating starsDr Fereidoun Dejahang
 
Alan Andrews - Defra's Draft Action Plans
Alan Andrews - Defra's Draft Action PlansAlan Andrews - Defra's Draft Action Plans
Alan Andrews - Defra's Draft Action PlansEmma-Victoria Fell
 
Oração do pinheirinho
Oração do pinheirinhoOração do pinheirinho
Oração do pinheirinhoIvone Boechat
 
20 de junio-Día de la Bandera Nacional Argentina.por: Rihani Assad
 20 de junio-Día de la Bandera Nacional Argentina.por: Rihani Assad  20 de junio-Día de la Bandera Nacional Argentina.por: Rihani Assad
20 de junio-Día de la Bandera Nacional Argentina.por: Rihani Assad Rihani Eli
 

Viewers also liked (20)

Re volução francesa
Re volução francesaRe volução francesa
Re volução francesa
 
نظم ظریف در جهان
نظم ظریف در جهاننظم ظریف در جهان
نظم ظریف در جهان
 
Comportamientos digitales
Comportamientos  digitalesComportamientos  digitales
Comportamientos digitales
 
فـاصـلـه سـتـارگان
فـاصـلـه سـتـارگانفـاصـلـه سـتـارگان
فـاصـلـه سـتـارگان
 
Formato competencias programacion_ii
Formato competencias programacion_iiFormato competencias programacion_ii
Formato competencias programacion_ii
 
6принцип наступності
6принцип наступності6принцип наступності
6принцип наступності
 
Manual exelearning 2014
Manual exelearning 2014Manual exelearning 2014
Manual exelearning 2014
 
Lecture 6 Headings
Lecture 6 HeadingsLecture 6 Headings
Lecture 6 Headings
 
شگفتي هاي سوره اخلاص 1
شگفتي هاي سوره اخلاص 1شگفتي هاي سوره اخلاص 1
شگفتي هاي سوره اخلاص 1
 
Educación y nuevas tecn
Educación y nuevas tecnEducación y nuevas tecn
Educación y nuevas tecn
 
Las fuentes de alimentación
Las fuentes de alimentaciónLas fuentes de alimentación
Las fuentes de alimentación
 
071 the stars-pulsars-pulsating stars
071 the stars-pulsars-pulsating stars071 the stars-pulsars-pulsating stars
071 the stars-pulsars-pulsating stars
 
اعجاز معنوی قرآن
اعجاز معنوی قرآناعجاز معنوی قرآن
اعجاز معنوی قرآن
 
"omphalos"
"omphalos"  "omphalos"
"omphalos"
 
Alan Andrews - Defra's Draft Action Plans
Alan Andrews - Defra's Draft Action PlansAlan Andrews - Defra's Draft Action Plans
Alan Andrews - Defra's Draft Action Plans
 
Patio Furniture Cayman
Patio Furniture CaymanPatio Furniture Cayman
Patio Furniture Cayman
 
جلوگیری از چشم بد
جلوگیری از چشم بدجلوگیری از چشم بد
جلوگیری از چشم بد
 
Oração do pinheirinho
Oração do pinheirinhoOração do pinheirinho
Oração do pinheirinho
 
001 a strategy for productivity
001 a strategy for productivity001 a strategy for productivity
001 a strategy for productivity
 
20 de junio-Día de la Bandera Nacional Argentina.por: Rihani Assad
 20 de junio-Día de la Bandera Nacional Argentina.por: Rihani Assad  20 de junio-Día de la Bandera Nacional Argentina.por: Rihani Assad
20 de junio-Día de la Bandera Nacional Argentina.por: Rihani Assad
 

Similar to New Security Challenges Juan Miguel Velasco

Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?OurCrowd
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse Microsoft
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...Amazon Web Services
 
Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017SMAU
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption publicJohn Mathon
 

Similar to New Security Challenges Juan Miguel Velasco (20)

Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 

Recently uploaded

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955Abheet Mangleek
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 

Recently uploaded (20)

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 

New Security Challenges Juan Miguel Velasco

  • 1. New  Security  Challenges  Facing   Cloud  and  Mobile  Expansion   Juan  M.  Velasco,    CEO,  Aiuken  Solu6ons.Spain     Company logos may appear on this title page
  • 2. 01The War of Currents: AC / DC Cloud Electricity from 1900 to 1930 Nicola Tesla Topsy 1903 2 20th Century 19th Century
  • 3. 01 Cloud Introduction– Electricity Cloud Electricity revolution vs Cloud Revolution 1890 – Anonymous Enterprise: “Our Business doesn’t need any external current at all, we are autonomous” FROM • No multi-client • Limited Generation • No standardization • High investment required • Dedicated technical team required • Local scope http://www.ree.es/operacion/curvas_demanda.asp TO • Multi-Client • Standard API (AC/DC – Voltage 110V-220V) • Pay – per – Use • 24x7 always on • Remote management & support • Unlimited service • Worldwide service
  • 4. How to find eficency with IT infrastructures? IT evolution Cloud as IaaS / SaaS IT Infrastructures Aplications SW Base & Middleware IT Equipment DataCenter Infrastructures First Approach to Cloud Transformation Manteinance consolidation Operations consolidation Support Considation Standarazation Software free HW Consolidation Virtualization Cooling Consolidation Free Cooling Cold / Warm corridor SaaS IaaS Services Centers Private Cloud (Sharing for Gov only) DataCenter Consolidation
  • 5. Cloud answer for: Efficiency? Standards? Interoperativity? roll back? Pricing? Answers? Security? SLAs?KPI?
  • 6. Cloud is NOT a technology is a market transformation In 2020, people will interact each day with more than 70 devices connected to Internet. Nowadays we interact with less than 10 devices connected. The M2M phenomenom will boots Cloud and Internet users and bandwidth use. From 1 billion users today to 3 billion devices connected in 5 years Cloud Computing Market transformation
  • 7. By 2014 will be more connected devices to Internet than people on Earth x5
  • 9. Mobility as an answer for : Availability Platforms? Security? Standards? Applications? BYOD? Backup?
  • 10. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E Mobile Risk Fuente: http://searchmobilecomputing.techtarget.com/ (201
  • 11. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E BYOD `Bring Your Own Device´ BYOD and consumerization, is one based on the desire of employees to use their own mobile devices (phones, smartphones, tablets, laptops ...) in the workplace and access to information from this company, such as the corporate email, DB or file servers. It is a reality accepted by IT departments, in the post-pc According to a survey of CISCO over 90% of CIOs surveyed said they permit, even doing the "blind eye," the use of mobile devices owned by employees to access their data. Of the principals surveyed more than two thirds have overcome fears this trend and see it as something positive for the organization. Yet another study, this time from the company BT, puts out the lack of vision of the potential risks of this practice on the part of employees, as only one in four sees risk in using their own devices, when almost 40% of companies have experienced security incidents related to this issue.
  • 12. www.globalt4e.comwww.isoluxcorsan.com © 2012 GT4E BYOD `Bring Your Own Device´ BYOD the New Threat door
  • 13. ncreased Mobile+ Cloud More Users + More Devices + More Services Reduced Stress =More Capacity + More Control + More Visibility DDos ¿Donde se para un DDoS?
  • 14. CLOUD  Security  concerns   Concerns about Public Cloud (not private Cloud?)
  • 15. 15
  • 17.
  • 18. Why  is  this  happening?  IPv4   Session / Paper Title 1815-16 Oct 2013
  • 19. Why  is  this  happening?  IPv4   Session / Paper Title 1915-16 Oct 2013
  • 20. Growing  of  new  aAacks  and  APTs     •  Number  of  threaths  x5  in  4  years   •  Nature  of  threats  and  aHacks  change:   –  From  general  and  diverse  to  persistent,   avanced  and  oriented   •  Avanced  aHacks  grow   –  High  vic6ms  level  profile  (i.e,  RSA;   Symantec,  Google)   –  Great  variety  of  new  APTs  like  Aurora   Opera6on,  Shady  RAT,  GhostNet,   Night  Dragon,  Nitro   “Organizations face an evolving threat scenario that they are ill-prepared to deal with….advanced threats that have bypassed their traditional security protection techniques and reside undetected on their systems.” Gartner, 2012 2004 2006 2008 2010 2012 Advanced Persistent Threats Zero-day Targeted Attacks Dynamic Trojans Stealth Bots Worms Viruses Disruption Spyware/ Bots Cybercrime Cyber-espionage and Cybercrime DamageofAttacks Source
  • 21. APT  AAacks.  AAacks  profile  has  increased   source
  • 22. APTs,  new  tools  for  DDoS  /  TDoS Advanced Persistent Threats (APTs) are created by different organizations from hackers like Lulzsec, Anonymous,etc. Also by Federeal Goverments like CIA, Mossad, etc.Their main motivation are: 1.  Goverment 2.  Economical 3.  Technical 4.  Military
  • 24. 24 Botnets   The  Criminal  Opera6ons  Team  
  • 25. DDoS  the  increasing  threat,  for  all  Internet  Services   Reason  1   • Universal   Reason  2   • Cheap   Reason  3   • Eficiency   Reason  4   • No  pushment   Reason  5   • Big  Impact   Reason  6   • Easy  to  replicate   Reason  7   • Underes6mate  
  • 26.
  • 27.
  • 28. 28 The New Perimeter. Security for and from Cloud. •  Cloud  must  play  an   ac6ve  defense  role   •  Cloud  must  be  an   ac6ve  player  for  the   perimeter  defense   •  Cloud  can  be  use   nowadays  as  an   ac6ve  extension  of   our  security   perimeter   •  Cloud  nowadays  is   able  to  provide  at   least  secure  email   and  internet  access   •  Cloud  must  provide   ac6ve  defense   ACT don’t REACT
  • 29. 29 Email Security Security  Challenges  of  Email  in  the  Cloud  
  • 30. Conclusion:  Secure  Cloud+  Mobile   Session / Paper Title 3015-16 Oct 2013 Clean Pipes AntiDDoS SOC DataCentre AntiAPTs ID Mgmt DNSNAT IPv6LTE WAFDPI
  • 31. 31 Juan Miguel Velasco López-Urda jmvelasco@aiuken.com CEO Aiuken Solutions