SlideShare a Scribd company logo
1 of 27
Restricted & Confidential
Daniel Beazer
26th September 2016
Chief Analyst
COMMON SENSE SECURITY
ECOMMERCE FORUM
1Restricted & Confidential
Who we are
BUSINESS PLATFORMS
2Restricted & Confidential
Cloud
Solutions
Managed Services
Connectivity
Solutions
Security Solutions
Hosting
Solutions
Colocation
Solutions
We need to talk about the security industry
3Restricted & Confidential
 Single threaded, deeply conflicted
 Too expensive and complex
 Doesn’t solve the problem
How the Security industry sells pt1
4Restricted & Confidential
Nation State
How the security industry sells pt 2
5Restricted & Confidential
And here’s your expensive solution …try understanding this
6Restricted & Confidential
In fact… it’s not as bad as all that
7Restricted & Confidential
 OWASP list mostly unchanged in ten years
 Ecommerce vastly more secure than offline
 Attacks increase as does ecommerce
 Roadmap technologies like Blockchain have
massive security potential
The result of traditional security sales tactics
8Restricted & Confidential
 The industry remains small at $76bn a year, with low growth, and in a growing threat
landscape
 Customers unconvinced deeply sceptical, will only spend money on security if forced
to or if under attack
 Compliance widely avoided with major retailers ignoring compliance regulations
 Fines are so small as to be a cost of business (£250k for Sony after breach involving
millions of UK gamers)
 Most ICO punishments are for the public sector pointlessly robbing Peter to pay Paul
 Meanwhile IT is being shaken up from top to bottom
Customer data is now the most valuable prize for hackers
9Restricted & Confidential
 Most security products defend the perimeter
 What is the target in 2016?
 Customer data has emerged as the hackers’ trophy
 CMS, databases are often poorly defended
– TalkTalk
 Social engineering using Facebook profiles
 … and the traditional IT model is being upended
‘Fixed fortifications are monuments to
man’s stupidity’ General Paton
What we want: common sense security
10Restricted & Confidential
 Don’t want to be patronized or scared
 We don’t to drown in data
 We want something easy to use, easy to set up and
easy to set up
 It needs to be affordable
Common sense security
11Restricted & Confidential
 Passwords
 People
 Patches
Security industry in summary
12Restricted & Confidential
A closer look at DDOS
13Restricted & Confidential
Data breaches come from attacks on Web Apps
14Restricted & Confidential
Web app attacks are
the most successful
attack campaigns (in
number of breaches)
Verizon DBIR 2016: Incidents
Undetected cyber attacks
15Restricted & Confidential
days taken to detect advanced
cyberthreats in Financial Services
days taken to detect advanced cyber
threats in Retail
98
197
Source: Ponemon Institure 2015
Criminals are the main culprits
16Restricted & Confidential
Source: Ponemon Institure 2015
Source: Hackmageddon 2015
17Restricted & Confidential
DDOS trends
18Restricted & Confidential Source: Hackmageddon 2015
 Most attacks are diversions
– Real prize is customer data
– Often poorly protected in CMS
 Application layer attacks increasing
– Hard to detect and mitigate
– Layer 7
 Botnets as a service
 Regulatory burden is growing
– Financial institutions in the US
– Proactive breach notification GDPR
The solution: JS challenges
19Restricted & Confidential Source: Hackmageddon 2015
Current solutions
20Restricted & Confidential
APPLIANCES CLOUD HYBRID
Appliance challenges
21Restricted & Confidential
 Large up-front capital investment, need 2 units for HA
 Months to acquire, install, test & tune before operational
 Difficult to learn, expensive skillsets to bring in-house
 Completely ineffective when network bandwidth is
saturated
 Incomplete without a Cloud-based mitigation component
 No sharing of threat intelligence
Why do we need hardware at all?
22Restricted & Confidential
Cloud challenges
23Restricted & Confidential
• Traversing public networks to and from cleansing POP drastically slows
down page loads
• Basic shared rule set, vulnerable to many types of attacks
• Better than basic is expensive
• The same bowl (IP space) with other customers
• The same low security posture and aggregated risk
Normal traffic flow
24Restricted & Confidential
On net DDOS protection
25Restricted & Confidential
Common sense security
26Restricted & Confidential
 Passwords
 People
 Patches
THANK YOU
COGECOPEER1.COM
27Restricted & Confidential

More Related Content

What's hot

Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioCyberGroup
 
F5 Networks Hacktivism Focus Group
F5 Networks Hacktivism Focus GroupF5 Networks Hacktivism Focus Group
F5 Networks Hacktivism Focus GroupF5 Networks
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesSplunk
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity SolutionsErin Planting
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeKevin Duffey
 
Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareScott Kortright
 
Build the Right Secure Your Network Devices
Build the Right Secure Your Network DevicesBuild the Right Secure Your Network Devices
Build the Right Secure Your Network Devicesconnectiscyber
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleKevin Duffey
 
Build the right secure corporate networks
Build the right secure corporate networksBuild the right secure corporate networks
Build the right secure corporate networksconnectiscyber
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksSangram Gayal
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldKevin Duffey
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For ActionBarry Greene
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdfSania Baker
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questionsBill McCabe
 
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...Accellis Technology Group
 

What's hot (20)

Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.io
 
F5 Networks Hacktivism Focus Group
F5 Networks Hacktivism Focus GroupF5 Networks Hacktivism Focus Group
F5 Networks Hacktivism Focus Group
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity Solutions
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
 
Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management Software
 
Build the Right Secure Your Network Devices
Build the Right Secure Your Network DevicesBuild the Right Secure Your Network Devices
Build the Right Secure Your Network Devices
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
Build the right secure corporate networks
Build the right secure corporate networksBuild the right secure corporate networks
Build the right secure corporate networks
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's world
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
 
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 

Viewers also liked

Dotmailer (Skip Fidura)
Dotmailer (Skip Fidura)Dotmailer (Skip Fidura)
Dotmailer (Skip Fidura)Screen Pages
 
Magento (David Wise)
Magento (David Wise)Magento (David Wise)
Magento (David Wise)Screen Pages
 
Amazon payments (Sean Casey)
Amazon payments (Sean Casey)Amazon payments (Sean Casey)
Amazon payments (Sean Casey)Screen Pages
 
Search Marketing update (Dan Richardson)
Search Marketing update (Dan Richardson)Search Marketing update (Dan Richardson)
Search Marketing update (Dan Richardson)Screen Pages
 
50 ways to increase your online sales (Roger Willcocks)
50 ways to increase your online sales (Roger Willcocks)50 ways to increase your online sales (Roger Willcocks)
50 ways to increase your online sales (Roger Willcocks)Screen Pages
 
Online trends & insights (Rebecca de Freitas)
Online trends & insights (Rebecca de Freitas)Online trends & insights (Rebecca de Freitas)
Online trends & insights (Rebecca de Freitas)Screen Pages
 
SeanCasey_Resume2016
SeanCasey_Resume2016SeanCasey_Resume2016
SeanCasey_Resume2016Sean Casey
 
Mage Titans MCR 2016 - Data Migration from Magento 1 to Magento 2 - Tadhg Bowe
Mage Titans MCR 2016 - Data Migration from Magento 1 to Magento 2 - Tadhg BoweMage Titans MCR 2016 - Data Migration from Magento 1 to Magento 2 - Tadhg Bowe
Mage Titans MCR 2016 - Data Migration from Magento 1 to Magento 2 - Tadhg BoweTadhg Bowe
 

Viewers also liked (15)

Dotmailer (Skip Fidura)
Dotmailer (Skip Fidura)Dotmailer (Skip Fidura)
Dotmailer (Skip Fidura)
 
Magento (David Wise)
Magento (David Wise)Magento (David Wise)
Magento (David Wise)
 
Amazon payments (Sean Casey)
Amazon payments (Sean Casey)Amazon payments (Sean Casey)
Amazon payments (Sean Casey)
 
Search Marketing update (Dan Richardson)
Search Marketing update (Dan Richardson)Search Marketing update (Dan Richardson)
Search Marketing update (Dan Richardson)
 
50 ways to increase your online sales (Roger Willcocks)
50 ways to increase your online sales (Roger Willcocks)50 ways to increase your online sales (Roger Willcocks)
50 ways to increase your online sales (Roger Willcocks)
 
Online trends & insights (Rebecca de Freitas)
Online trends & insights (Rebecca de Freitas)Online trends & insights (Rebecca de Freitas)
Online trends & insights (Rebecca de Freitas)
 
SeanCasey_Resume2016
SeanCasey_Resume2016SeanCasey_Resume2016
SeanCasey_Resume2016
 
Mention me
Mention meMention me
Mention me
 
Mage Titans MCR 2016 - Data Migration from Magento 1 to Magento 2 - Tadhg Bowe
Mage Titans MCR 2016 - Data Migration from Magento 1 to Magento 2 - Tadhg BoweMage Titans MCR 2016 - Data Migration from Magento 1 to Magento 2 - Tadhg Bowe
Mage Titans MCR 2016 - Data Migration from Magento 1 to Magento 2 - Tadhg Bowe
 
Search Marketing
Search MarketingSearch Marketing
Search Marketing
 
What Users Do
What Users DoWhat Users Do
What Users Do
 
Bronto
BrontoBronto
Bronto
 
Brand and Soul
Brand and SoulBrand and Soul
Brand and Soul
 
Magento
MagentoMagento
Magento
 
Amazon Payments
Amazon PaymentsAmazon Payments
Amazon Payments
 

Similar to Online security (Daniel Beazer)

Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframePrecisely
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San JoseMoshe Ferber
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion, Inc.
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees
 

Similar to Online security (Daniel Beazer) (20)

Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the water
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018
 

More from Screen Pages

Screen Pages introduction
Screen Pages introductionScreen Pages introduction
Screen Pages introductionScreen Pages
 
Right people in the right seats (Julia Langkraehr)
Right people in the right seats (Julia Langkraehr)Right people in the right seats (Julia Langkraehr)
Right people in the right seats (Julia Langkraehr)Screen Pages
 
Analytics update - Sean Burton
Analytics update - Sean BurtonAnalytics update - Sean Burton
Analytics update - Sean BurtonScreen Pages
 
Screen Pages Introduction
Screen Pages IntroductionScreen Pages Introduction
Screen Pages IntroductionScreen Pages
 
Search update - Dan Richardson
Search update - Dan RichardsonSearch update - Dan Richardson
Search update - Dan RichardsonScreen Pages
 
E-commerce Seminar: 50 ways to increase your online sales
E-commerce Seminar: 50 ways to increase your online salesE-commerce Seminar: 50 ways to increase your online sales
E-commerce Seminar: 50 ways to increase your online salesScreen Pages
 
Sheerluxe: 50 tips to improve your online sales performance
Sheerluxe: 50 tips to improve your online sales performanceSheerluxe: 50 tips to improve your online sales performance
Sheerluxe: 50 tips to improve your online sales performanceScreen Pages
 

More from Screen Pages (17)

Amazon Payments
Amazon PaymentsAmazon Payments
Amazon Payments
 
Ebizmarts
EbizmartsEbizmarts
Ebizmarts
 
Dan Richardson
Dan RichardsonDan Richardson
Dan Richardson
 
Klevu
KlevuKlevu
Klevu
 
Cogeco Peer1
Cogeco Peer1Cogeco Peer1
Cogeco Peer1
 
Magento 2
Magento 2Magento 2
Magento 2
 
Dotmailer
DotmailerDotmailer
Dotmailer
 
Screen Pages introduction
Screen Pages introductionScreen Pages introduction
Screen Pages introduction
 
Screen Pages
Screen PagesScreen Pages
Screen Pages
 
Right people in the right seats (Julia Langkraehr)
Right people in the right seats (Julia Langkraehr)Right people in the right seats (Julia Langkraehr)
Right people in the right seats (Julia Langkraehr)
 
Ometria
OmetriaOmetria
Ometria
 
Analytics update - Sean Burton
Analytics update - Sean BurtonAnalytics update - Sean Burton
Analytics update - Sean Burton
 
Magento Update
Magento UpdateMagento Update
Magento Update
 
Screen Pages Introduction
Screen Pages IntroductionScreen Pages Introduction
Screen Pages Introduction
 
Search update - Dan Richardson
Search update - Dan RichardsonSearch update - Dan Richardson
Search update - Dan Richardson
 
E-commerce Seminar: 50 ways to increase your online sales
E-commerce Seminar: 50 ways to increase your online salesE-commerce Seminar: 50 ways to increase your online sales
E-commerce Seminar: 50 ways to increase your online sales
 
Sheerluxe: 50 tips to improve your online sales performance
Sheerluxe: 50 tips to improve your online sales performanceSheerluxe: 50 tips to improve your online sales performance
Sheerluxe: 50 tips to improve your online sales performance
 

Recently uploaded

一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样AS
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxi191686
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...mikehavy0
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsrahman018755
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证hfkmxufye
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxthinamazinyo
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理apekaom
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理AS
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书c6eb683559b3
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27APNIC
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理AS
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样ayvbos
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 

Recently uploaded (20)

一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 

Online security (Daniel Beazer)

  • 1. Restricted & Confidential Daniel Beazer 26th September 2016 Chief Analyst COMMON SENSE SECURITY ECOMMERCE FORUM 1Restricted & Confidential
  • 2. Who we are BUSINESS PLATFORMS 2Restricted & Confidential Cloud Solutions Managed Services Connectivity Solutions Security Solutions Hosting Solutions Colocation Solutions
  • 3. We need to talk about the security industry 3Restricted & Confidential  Single threaded, deeply conflicted  Too expensive and complex  Doesn’t solve the problem
  • 4. How the Security industry sells pt1 4Restricted & Confidential Nation State
  • 5. How the security industry sells pt 2 5Restricted & Confidential
  • 6. And here’s your expensive solution …try understanding this 6Restricted & Confidential
  • 7. In fact… it’s not as bad as all that 7Restricted & Confidential  OWASP list mostly unchanged in ten years  Ecommerce vastly more secure than offline  Attacks increase as does ecommerce  Roadmap technologies like Blockchain have massive security potential
  • 8. The result of traditional security sales tactics 8Restricted & Confidential  The industry remains small at $76bn a year, with low growth, and in a growing threat landscape  Customers unconvinced deeply sceptical, will only spend money on security if forced to or if under attack  Compliance widely avoided with major retailers ignoring compliance regulations  Fines are so small as to be a cost of business (£250k for Sony after breach involving millions of UK gamers)  Most ICO punishments are for the public sector pointlessly robbing Peter to pay Paul  Meanwhile IT is being shaken up from top to bottom
  • 9. Customer data is now the most valuable prize for hackers 9Restricted & Confidential  Most security products defend the perimeter  What is the target in 2016?  Customer data has emerged as the hackers’ trophy  CMS, databases are often poorly defended – TalkTalk  Social engineering using Facebook profiles  … and the traditional IT model is being upended ‘Fixed fortifications are monuments to man’s stupidity’ General Paton
  • 10. What we want: common sense security 10Restricted & Confidential  Don’t want to be patronized or scared  We don’t to drown in data  We want something easy to use, easy to set up and easy to set up  It needs to be affordable
  • 11. Common sense security 11Restricted & Confidential  Passwords  People  Patches
  • 12. Security industry in summary 12Restricted & Confidential
  • 13. A closer look at DDOS 13Restricted & Confidential
  • 14. Data breaches come from attacks on Web Apps 14Restricted & Confidential Web app attacks are the most successful attack campaigns (in number of breaches) Verizon DBIR 2016: Incidents
  • 15. Undetected cyber attacks 15Restricted & Confidential days taken to detect advanced cyberthreats in Financial Services days taken to detect advanced cyber threats in Retail 98 197 Source: Ponemon Institure 2015
  • 16. Criminals are the main culprits 16Restricted & Confidential Source: Ponemon Institure 2015 Source: Hackmageddon 2015
  • 18. DDOS trends 18Restricted & Confidential Source: Hackmageddon 2015  Most attacks are diversions – Real prize is customer data – Often poorly protected in CMS  Application layer attacks increasing – Hard to detect and mitigate – Layer 7  Botnets as a service  Regulatory burden is growing – Financial institutions in the US – Proactive breach notification GDPR
  • 19. The solution: JS challenges 19Restricted & Confidential Source: Hackmageddon 2015
  • 20. Current solutions 20Restricted & Confidential APPLIANCES CLOUD HYBRID
  • 21. Appliance challenges 21Restricted & Confidential  Large up-front capital investment, need 2 units for HA  Months to acquire, install, test & tune before operational  Difficult to learn, expensive skillsets to bring in-house  Completely ineffective when network bandwidth is saturated  Incomplete without a Cloud-based mitigation component  No sharing of threat intelligence
  • 22. Why do we need hardware at all? 22Restricted & Confidential
  • 23. Cloud challenges 23Restricted & Confidential • Traversing public networks to and from cleansing POP drastically slows down page loads • Basic shared rule set, vulnerable to many types of attacks • Better than basic is expensive • The same bowl (IP space) with other customers • The same low security posture and aggregated risk
  • 25. On net DDOS protection 25Restricted & Confidential
  • 26. Common sense security 26Restricted & Confidential  Passwords  People  Patches