This document provides an outlook on cyber security for 2016, highlighting key cyber attacks that occurred in 2015 and trends moving forward. Some of the major cyber attacks in 2015 included hacking of Uber and Apple accounts, an Amazon password reset, and data breaches at LinkedIn and Spotify. There was also a record-breaking 602Gbps DDoS attack against BBC and a leak of 25GB of user data from Ashley Madison. The document discusses challenges around security of industrial control systems and internet of things devices. It recommends building cyber resilience through improving cyber defenses, increasing human expertise and collaboration, and ensuring critical infrastructures have cyber security operation centers for compliance. The outlook predicts a focus on security of industrial control systems and critical infrastructure in
The State Of Information and Cyber Security in 2016Shannon G., MBA
Shannon Glass, Practice Director from AfidenceIT talks about the State of Information and Cyber Security in 2016. She covers the importance of creating a culture of security awareness within an organization, threats to look out for on the landscape, and why you should care about protecting your data assets.
The State Of Information and Cyber Security in 2016Shannon G., MBA
Shannon Glass, Practice Director from AfidenceIT talks about the State of Information and Cyber Security in 2016. She covers the importance of creating a culture of security awareness within an organization, threats to look out for on the landscape, and why you should care about protecting your data assets.
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
What a year 2014 has been for cybercriminals! It’s time to take a look back at 2014 and learn what’s in store for 2015. How much further will cybercriminals go? What new techniques will we see? What are the main threats we should be wary of in 2015?
From new malware families to PC grade mobile malware, from persistent PC Trojans to cloud based criminal services –cybercriminals have been keeping busy with new and advanced techniques.
In this session, IBM Security’s Senior Fraud Prevention Strategist, Etay Maor, will take you through the top stories that made waves in in 2014’s cybercrime threat environment and review at the upcoming cybercrime trends for 2015.
We will look some of the biggest (and baddest) in cybercrime innovation, showcasing specific attacks that highlight the ingenuity observed in 2014 and discuss what we can expect in terms of PC and mobile fraud in 2015.
In this presentation, you will learn about:
– Latest malware attacks and evasion techniques
– How organizations failed to prevent attacks in 2014
– Forecast of how recent attacks will affect attacks in 2015
View the full on-demand webcast: https://attendee.gotowebinar.com/recording/4171628843485100290
When money is the at the top of the mind of cybercriminals, where do they turn their heads to? The Banking Sector. With countless operations including Wealth Management, Trading, and Revenue Management, Investor Accounting, it is no light matter when we say that cybersecurity threats keep banks up at night. With data breaches rampantly hitting all types of organizations across the world, the banking sector, for obvious reasons, stays under a constant and increased pressure for safekeeping of their customer's data and more importantly, their money.
This session will discuss the main cyber threats for 2019 by including security public and private sector experts. After an overview of the top cybersecurity industry predictions for the coming year, the panel will discuss effective solutions and roadmaps needed as we head into the 2020s.
Main points covered:
• What are the top cyber threats facing enterprises in 2019?
• What do the major cybersecurity vendors believe will happen in the next few years?
• What is being done to prepare for daily cyber-attacks facing enterprises?
• What projects are leading Chief Information Security Officers (CISOs) and Chief Risk Officers (CROs) implementing now?
Presenters:
Our first presenter for this session is Maria S. Thompson, State Chief Risk and Security Officer for the State of North Carolina. Maria brings to the State over 20 years of experience in Information Technology and cybersecurity. Maria’s personal honors include receiving the 2007 National Security Agency’s prestigious Rowlett Award for individual achievement in Information Assurance. Additionally, she received the 2008 Office of Secretary of Defense Certificate of Excellence for the implementation of an IA strategy for the Information Assurance Workforce. Most recently, Maria was selected as a winner of one of the 2018 Triangle Business Journal Women in Business award and State Scoop’s 50th Award State Cybersecurity Leader
The second presenter is Dan Lohrmann is an internationally recognized cybersecurity leader, technologist and author. Starting his career at NSA, Lohrmann has served global organizations in the public and private sectors in many leadership capacities. As a top Michigan Government technology executive for seventeen years, Dan was national CSO of the Year, Public Official of the Year and a Computerworld Premier 100 IT Leader. He is currently CSO & Chief Strategist at Security Mentor, where he advises global and local corporations and governments on cybersecurity and technology infrastructure strategies and security culture change. He has been a keynote speaker at security conferences from South Africa to Europe and Washington D.C. to Moscow.
Recorded Webinar: https://youtu.be/IHAAXQ30zBk
In 2015 alone, hackers stole the records of - 11 million people from Premiere Blue Cross- 10 million people from Excellus BlueCross BlueShield- 80 million people from Anthem. We review the challenges, trends and opportunity of the cyberspace wars. Presented to APICS Ventura on March 8, 2016 by Gerry Poe - CEO of Santa Clarita Consultants. http://www.scc-co.com
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016?
Review this presentation and learn:
• Why cyber attacks continue to increase in sophistication, magnitude and velocity
• What trends will have the largest and smallest impact on cyber security in 2016
• Why cloud-based apps and the Internet of Things have transformed cyber security
• How you can protect your organization from attacks from the inside
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
View on-demand presentation: http://securityintelligence.com/events/ibm-2015-cyber-security-intelligence-index/
The cyber threat landscape is increasing in complexity and frequency. Organizations that have historically not been the target of cyber attacks now make headline news with large data losses and compromised transactions. Organizations need a clear point of view on how to respond to these threats, and one that incorporates not only the relevant technology but also the organizational changes needed.
Nick Bradley, Practice Leader of the IBM Threat Research Group and the X-Force Threat Analysis Team, and Nick Coleman, Global Head Cyber Security Intelligence Services outline what organizations need to do now and in the future to stay ahead of the growing cyber security threat.
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
A Glimpse into the Cybercrime Underground
In this session, Trusteer’s senior fraud prevention strategist, Etay Maor, will dive into the latest tools, techniques and threats developed and utilized by cybercriminals. The presentation will include a market overview of the latest offerings from the criminal underground, with a deep dive into some of the techniques discussed by cybercriminals, and review how they manifest as real attacks with real examples and case studies. A share of the presentation will also be dedicated to possible mitigation strategies and techniques.
During this webinar you will learn about:
- New malware attack and evasion techniques
- The latest underground offerings on the “fraud as a service” market
- The latest rumors and discussions around malware and malware authors from the underground
- Real-time intelligence and adaptable counter measures
Jason Smith shared cyber security trends from 2018 into the beginning of 2019 at the SCTBA Convention, how the threat actor model has changed, and what businesses should do.
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
By A.K. Vishwanathan, Senior Director – Enterprise Risk Services, Deloitte India
Vis is a Chartered Accountant, has a Certified in Risk and Information System Control (CRISC) and a member of the Information Systems Audit and Controls Association (ISACA).
He has advised large organisations in their endeavour in information security and controls, and led risk consulting in complex environments and regulated industries; specifically banking and financial services, telecom, manufacturing, oil and gas, pharma and life sciences and government sector.
Breaking down the cyber security framework closing critical it security gapsIBM Security
Cyber crime is pervasive and here to stay. Whether you work in the Public Sector, Private Sector, are the CEO for a Fortune 500 Company or trying to sustain a SMB everyone is under attack. This February, President Obama, issued an executive order aimed at protecting critical business and government infrastructure due to the scale and sophistication of IT security threats that have grown at an explosive rate. Organizations and Government agencies have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more focused adversary with the resources and capabilities to target highly sensitive information, often through long-term attack campaigns. Many security executives are struggling to answer questions about the most effective approach.
The frequency and impact of cyber attacks have escalated cybersecurity to the top of Board agendas. Institutions are no longer asking if they are vulnerable to cyber attacks. Instead, the focus has shifted to how the attack might be executed, risks and impact. Most importantly, their organisational readiness and resilience to such threats.
The pace and scale of technology advancements have created extraordinary avenues for businesses to grow. But with opportunities come risks, which need to be constantly navigated. Read this blog to uncover the top 5 cybersecurity trends to watch out for in 2021 and beyond.
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
What a year 2014 has been for cybercriminals! It’s time to take a look back at 2014 and learn what’s in store for 2015. How much further will cybercriminals go? What new techniques will we see? What are the main threats we should be wary of in 2015?
From new malware families to PC grade mobile malware, from persistent PC Trojans to cloud based criminal services –cybercriminals have been keeping busy with new and advanced techniques.
In this session, IBM Security’s Senior Fraud Prevention Strategist, Etay Maor, will take you through the top stories that made waves in in 2014’s cybercrime threat environment and review at the upcoming cybercrime trends for 2015.
We will look some of the biggest (and baddest) in cybercrime innovation, showcasing specific attacks that highlight the ingenuity observed in 2014 and discuss what we can expect in terms of PC and mobile fraud in 2015.
In this presentation, you will learn about:
– Latest malware attacks and evasion techniques
– How organizations failed to prevent attacks in 2014
– Forecast of how recent attacks will affect attacks in 2015
View the full on-demand webcast: https://attendee.gotowebinar.com/recording/4171628843485100290
When money is the at the top of the mind of cybercriminals, where do they turn their heads to? The Banking Sector. With countless operations including Wealth Management, Trading, and Revenue Management, Investor Accounting, it is no light matter when we say that cybersecurity threats keep banks up at night. With data breaches rampantly hitting all types of organizations across the world, the banking sector, for obvious reasons, stays under a constant and increased pressure for safekeeping of their customer's data and more importantly, their money.
This session will discuss the main cyber threats for 2019 by including security public and private sector experts. After an overview of the top cybersecurity industry predictions for the coming year, the panel will discuss effective solutions and roadmaps needed as we head into the 2020s.
Main points covered:
• What are the top cyber threats facing enterprises in 2019?
• What do the major cybersecurity vendors believe will happen in the next few years?
• What is being done to prepare for daily cyber-attacks facing enterprises?
• What projects are leading Chief Information Security Officers (CISOs) and Chief Risk Officers (CROs) implementing now?
Presenters:
Our first presenter for this session is Maria S. Thompson, State Chief Risk and Security Officer for the State of North Carolina. Maria brings to the State over 20 years of experience in Information Technology and cybersecurity. Maria’s personal honors include receiving the 2007 National Security Agency’s prestigious Rowlett Award for individual achievement in Information Assurance. Additionally, she received the 2008 Office of Secretary of Defense Certificate of Excellence for the implementation of an IA strategy for the Information Assurance Workforce. Most recently, Maria was selected as a winner of one of the 2018 Triangle Business Journal Women in Business award and State Scoop’s 50th Award State Cybersecurity Leader
The second presenter is Dan Lohrmann is an internationally recognized cybersecurity leader, technologist and author. Starting his career at NSA, Lohrmann has served global organizations in the public and private sectors in many leadership capacities. As a top Michigan Government technology executive for seventeen years, Dan was national CSO of the Year, Public Official of the Year and a Computerworld Premier 100 IT Leader. He is currently CSO & Chief Strategist at Security Mentor, where he advises global and local corporations and governments on cybersecurity and technology infrastructure strategies and security culture change. He has been a keynote speaker at security conferences from South Africa to Europe and Washington D.C. to Moscow.
Recorded Webinar: https://youtu.be/IHAAXQ30zBk
In 2015 alone, hackers stole the records of - 11 million people from Premiere Blue Cross- 10 million people from Excellus BlueCross BlueShield- 80 million people from Anthem. We review the challenges, trends and opportunity of the cyberspace wars. Presented to APICS Ventura on March 8, 2016 by Gerry Poe - CEO of Santa Clarita Consultants. http://www.scc-co.com
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016?
Review this presentation and learn:
• Why cyber attacks continue to increase in sophistication, magnitude and velocity
• What trends will have the largest and smallest impact on cyber security in 2016
• Why cloud-based apps and the Internet of Things have transformed cyber security
• How you can protect your organization from attacks from the inside
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
View on-demand presentation: http://securityintelligence.com/events/ibm-2015-cyber-security-intelligence-index/
The cyber threat landscape is increasing in complexity and frequency. Organizations that have historically not been the target of cyber attacks now make headline news with large data losses and compromised transactions. Organizations need a clear point of view on how to respond to these threats, and one that incorporates not only the relevant technology but also the organizational changes needed.
Nick Bradley, Practice Leader of the IBM Threat Research Group and the X-Force Threat Analysis Team, and Nick Coleman, Global Head Cyber Security Intelligence Services outline what organizations need to do now and in the future to stay ahead of the growing cyber security threat.
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
A Glimpse into the Cybercrime Underground
In this session, Trusteer’s senior fraud prevention strategist, Etay Maor, will dive into the latest tools, techniques and threats developed and utilized by cybercriminals. The presentation will include a market overview of the latest offerings from the criminal underground, with a deep dive into some of the techniques discussed by cybercriminals, and review how they manifest as real attacks with real examples and case studies. A share of the presentation will also be dedicated to possible mitigation strategies and techniques.
During this webinar you will learn about:
- New malware attack and evasion techniques
- The latest underground offerings on the “fraud as a service” market
- The latest rumors and discussions around malware and malware authors from the underground
- Real-time intelligence and adaptable counter measures
Jason Smith shared cyber security trends from 2018 into the beginning of 2019 at the SCTBA Convention, how the threat actor model has changed, and what businesses should do.
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
By A.K. Vishwanathan, Senior Director – Enterprise Risk Services, Deloitte India
Vis is a Chartered Accountant, has a Certified in Risk and Information System Control (CRISC) and a member of the Information Systems Audit and Controls Association (ISACA).
He has advised large organisations in their endeavour in information security and controls, and led risk consulting in complex environments and regulated industries; specifically banking and financial services, telecom, manufacturing, oil and gas, pharma and life sciences and government sector.
Breaking down the cyber security framework closing critical it security gapsIBM Security
Cyber crime is pervasive and here to stay. Whether you work in the Public Sector, Private Sector, are the CEO for a Fortune 500 Company or trying to sustain a SMB everyone is under attack. This February, President Obama, issued an executive order aimed at protecting critical business and government infrastructure due to the scale and sophistication of IT security threats that have grown at an explosive rate. Organizations and Government agencies have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more focused adversary with the resources and capabilities to target highly sensitive information, often through long-term attack campaigns. Many security executives are struggling to answer questions about the most effective approach.
The frequency and impact of cyber attacks have escalated cybersecurity to the top of Board agendas. Institutions are no longer asking if they are vulnerable to cyber attacks. Instead, the focus has shifted to how the attack might be executed, risks and impact. Most importantly, their organisational readiness and resilience to such threats.
The pace and scale of technology advancements have created extraordinary avenues for businesses to grow. But with opportunities come risks, which need to be constantly navigated. Read this blog to uncover the top 5 cybersecurity trends to watch out for in 2021 and beyond.
Seoul | Jun-15 | Smart Villages Agenda & ConceptSmart Villages
Given by: Dr Terry van Gevelt
Our Seoul media workshop was a two-day residential event featuring a combination of background briefings from local and international experts and entrepreneurs on energy markets and developments in the South East Asian off-grid sector. The workshop offered an opportunity to explore the Smart Villages concept and study nascent Smart Village projects and relevant technologies from around the world.
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...Andreas Kamilaris
With the recent advancement of the Internet of Things (IoT), it is now possible to process a large number of sensor data streams using different large-scale IoT platforms. These IoT frameworks are used to collect, process and analyse data streams in real-time and facilitate provision of smart solutions
designed to provide decision support. Existing IoT-based solutions are mainly domain-dependent, providing stream processing and analytics focusing on specific areas (smart cities, healthcare etc.). In the context of agri-food industry, a variety of external parameters belonging to different domains (e.g. weather conditions, regulations etc.) have a major influence over the food supply chain, while flexible and adaptive IoT frameworks, essential to truly realize the concept of smart farming, are currently inexistent. In this presentation, we propose Agri-IoT, a semantic framework for IoT-based smart farming applications, which supports reasoning over
various heterogeneous sensor data streams in real-time. Agri-
IoT can integrate multiple cross-domain data streams, providing
a complete semantic processing pipeline, offering a common
framework for smart farming applications. Agri-IoT supports
large-scale data analytics and event detection, ensuring seamless interoperability among sensors, services, processes, operations, farmers and other relevant actors, including online information sources and linked open datasets and streams available on the Web.
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS
By Ms. Tan Lay Ngan, Senior Lecturer & Consultant, IT Strategy & Management and Mr. Ng Kok Leong, Senior Manager, Information Services
With Singapore’s push towards international connectivity and the adoption of digital technologies, we inadvertently expand our cyber-attack surface. We become more exposed to cyber-threats – from individual, opportunistic hackers, to professional and organised cyber criminals groups, affecting our intellectual property, businesses and even our safety.
In this session, you will learn the essentials of cybersecurity and experience how cyber threats can attack your environment through cybersecurity games, ultimately understanding the importance of an informed organisational culture that emphasises cybersecurity.
When money is the at the top of the mind of
cybercriminals, where do they turn their heads to? The
Banking Sector. This SlideShare takes you through the top 5 cybersecurity risks that banks and other financial firms face today.
90% of data that exist today was created in the past 2 years. This massive amount of data allows organizations to take a
more qualitative approach to business and customer
service, but also makes them vulnerable to a continually
increasing number of threats.
A STUDY ON CYBER SECURITY AND ITS RISKS K. JeniferAM Publications
Cyber security is a basic term used nowadays by each and everyone in the world. It is appropriate to know about cyber security as everything became digitized in our day-today life, because digital world is the place where cyber crimes emerge. Securing the information has become one of the biggest challenges in the present day. Various measures are taken in order to prevent these cyber crimes, though cyber security is still a very big concern. In this paper I have made a study on cyber security, how far cyber crimes are increasing and what are the threats we should be aware of.
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
Using an AI-powered analytics platform, IT organizations can shift from a reactive approach to security breaches, to proactively identifying increasingly sophisticated threat vectors and quickly resolving exploitable vulnerabilities.
Social engineering and human error present the single biggest threat to companies in 2017. In fact, 60% of enterprise companies were targeted by social engineering attacks within the last year. As cyber security automation practices get better, attackers are increasingly relying on social engineering to make their way into systems and networks.
Visit- https://www.siemplify.co/
CYBERFORT Technologies seeks to impart quality Information Security programs that would equip Information Security professionals with the necessary tools and education to help them avert Cyber-crimes, Cyber espionage, Cyber terrorism and if the need arises, Cyber wars.
Cyberspace is rapidly transforming our lives – how we live, interact, govern and create value. With the JAM (Jan Dhan, Aadhaar and Mobile) trinity, India is at the forefront of global digital transformation. “Digital India” is being hailed as the world's largest technology led programme of its kind.
While internet, smartphones and modern information and
communication devices have been great force multipliers, endless connectivity and proliferation of IoT devices is giving rise to vulnerabilities, risks and concerns. Cyber security is today ranked among top threats by governments and corporates. Heightened concerns about data security and privacy have resulted in a spate of regulations in India and across the world. India is in the process of discussing and enacting its own comprehensive data security and privacy regulation, as well as vertical specific ones. Cyber security is an ecosystem where laws, organisations, skills, cooperation and
technical implementation would need to be in harmony to be
effective.
Overall, a robust regulatory framework based on global and
country-specific regulations, development of a holistic cyber
security eco-system (academia and industry as well as
entrepreneurial) and a coordinated global approach through
proactive cyber diplomacy would help to secure cyber space and promote confidence and trust of key stakeholders including
citizens, businesses, political and security leaders.
CII has been actively working in the cyber security space. The CII Task Force on Public Private Partnership for Security of the Cyber Space has been set up to bring about improvements in the legal framework to strengthen and maintain a safe cyberspace ecosystem by capacity building through education and training programmes. We would facilitate collaboration and cooperation between Government and Industry in the area of cyber security in general and protection of critical information infrastructure in particular, covering cyber threats, vulnerabilities, breaches, potential protective measures, and adoption of best practices.
What are top 7 cyber security trends for 2020TestingXperts
Top 7 Cybersecurity Trends to Look Out For in 2020. Data Breaches as the Top Cyberthreat. The Cybersecurity Skills Gap. Cloud Security Issues. Automation and Integration in Cybersecurity. A Growing Awareness of the Importance of Cybersecurity. Mobile Devices as a Major Cybersecurity Risk.
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
Cyber Security in business is all about protecting the data, not just the online data but also the offline data, from theft and any sort of damage. It includes the security of personal data, intellectual property data, protected information, sensitive data, government data as well as the data of various industries. It is a shield that helps in safeguarding the entire data of a business. Running a business is not everyone’s cup of tea and what makes it further difficult is the absence of cyber security. Let’s learn what impact this service has on the running of a successful business.
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
Cybersecurity is a difficult and serious endeavor which over time strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone.
Peering into the future of cybersecurity provides valuable insights around the challenges and opportunities. The industry is changing rapidly and attackers seem to always be one step ahead. Organizations must not only address what is ongoing, but also prepare for how cyber-threats will maneuver in the future.
The 2016 Cybersecurity Predictions presentation showcases the cause-and-effect relationships and provides insights and perspectives of the forthcoming challenges the industry is likely to face and how we can be better prepared for it.
Iot Cyber Security & Vulnerabilities Challenges and Opportunities in Security of Internet of Things
Security is the Key
Inherent Security Challenges
Threat Spectrum – Trends
Securing the “Things”
IoT Cybersecurity – Security Triad
Threat Model
Availability threats
Integrity threats
Authenticity threats
Confidentiality threats
Non-repudiation/accountability threats
Similar to Outlook Briefing 2016: Cyber Security (20)
Indosat Ooredoo (formerly Indosat) is one of Indonesia's largest telecommunication networks and services provider.[3]
Indosat offers (prepaid and postpaid) mobile phone services (Mentari, IM3 and Matrix), fixed voice services (including International Direct Dialing (IDD)), fixed wireless and fixed telephone services.[3][4] The company also provides Multimedia, Internet & Data Communication Services (MIDI).[4]
As of 2012 the company holds around 21 percent of market share. It has around 50 million cellular subscribers.[3] An Indonesian investment website stated that the company has lost a couple of percentage points in terms of market share on the mobile phone market in Indonesia in recent years.
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung (globally-networked)Mastel Indonesia
Berpadunya teknologi telekomunikasi, internet, dan penyiaran, telah mendorong munculnya infrastruktur ekonomi baru yang disebut dengan Jaringan Broadband. Manfaat dari keberadaan jaringan broadband bagi peningkatan kualitas kehidupan sosial dan ekonomi suatu bangsa kiranya tidak perlu dibahas lagi dalam naskah ini. Sisi lain yang amat perlu dipahami adalah bahwa saat jaringan broadband domestik tersambung dengan jaringan broadband global, seluruh aset nasional dapat menjadi terhubung (networked) ke jaringan global. Keterhubungan global ini membentuk dunia baru Cyber-World yang memindahkan kehidupan tatap-muka atau temu fisik menjadi kehidupan Online. Keterhubungan ini memberi banyak kemudahan, namun juga membawa kerentanan dan ancaman baru, yaitu ancaman kedaulatan Cyber.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
Eureka, I found it! - Special Libraries Association 2021 Presentation
Outlook Briefing 2016: Cyber Security
1. Outlook Briefing 2016:
Cyber Security
Charles Lim
Senior Industry Analyst, Cyber Security - Digital Transformation Practice
Frost & Sullivan Asia Pacific
Charles.Lim@frost.com
3. Proliferation of Cyber Attacks in 2015 targeted popular services
Data is the new gold, inability to secure them leads to distrust in services
3
Uber accounts have been
hacked and are being used to
secure rides in China without
their consent or knowledge
Apple had to remove more than
300 apps from its app store
infected by xCodeGhost malware,
affecting 500 million users
In the week of Black Friday,
Amazon has reportedly begun
forcibly resetting some users’
passwords over concerns
about a major breach.
54% of security professionals view
social engineering attacks through
phishing emails as the top threat
technique that they have encountered
Over one thousand email
addresses and passwords from
Spotify were possibly leaked
LinkedIn encountered a major breach of its
password database - a file containing passwords
using “linkedin” appeared in an online forum
A security researcher discovered a way to
perform remote code execution and retrieve
confidential data from Instagram and Facebook
Twitter emailed more than 20 users,
warning them they may have been
targeted by hackers ‘possibly
associated with a government’
A Vine star who makes
£2,000 per second from
his posts claims he has
been hacked, with all of his
videos deleted from his
account
Google Malaysia’s site
was hacked; visitors
were re-directed to a
hacker’s webpage
Hackers claiming to be
working on behalf of ISIS took
over the Twitter and
YouTube accounts of the
United States Central
Command
All of these attacks occurred in 2015
Compromised Skype users reported
that malicious links and messages were
sent to their contact list
4. Cyber attacks – fueling the international crime scene, online
100MMore than 100 million
health care records
compromised in 2015.
Medical records are worth
10 times more than credit
card information in the
dark web.
5. Cyber attacks – the channel for making a statement
602GbpsOn 31st Dec 2015, BBC received a
602Gbps Distributed Denial of Service
(DDoS) attack, the highest ever
recorded in history.
New World Hacking, who claimed
responsibility announced that it was a
test of their power. Their main target
are ISIS websites.
25GB LEAKEDThe Impact Team stole more than 25GB user data
from adultery website, Ashley Madison and released
the information on 18th August 2015.
The original intention was to force Avid Life Media to
shut down the website, and stop online adultery.
6. “Indonesia experiences around 50,000 cyber attacks every day. That makes
it the second-most targeted country for cyber attack after Vietnam.”
- Yono Reksoprodj, advisor to Minister for Political, Legal and Security Affairs Tedjo Edhy Purdijatno
Speaking on Indonesia’s National Cyber Agency 8th Jun 2015
>50,000 ATTACKS
7. “We don’t believe any cyberdefense is fail proof. But a strong, well
thought out strategy, coupled with a rapid ability for a bank to understand
when its systems have been maliciously penetrated and swiftly take the
necessary actions, such as isolating the attack, is key to a successful
cybersecurity strategy.”
- Stuart Plesser, Standard & Poor’s
Press statement pertaining to possible downgrade of banks’ ratings,
if it is believed to be ill-prepared to withstand cyber attacks.
7
8. The need to focus on Industrial Control Systems Security as priority
8
Security Challenges within Internet of Things
Source: Frost & Sullivan
Connected cars has been
proven to be hacked in
recent times, however the
actual impact is to the
driver’s safety and are at a
very nascent stage of
security that is acted now by
automobile manufacturers.
Connected homes, which
are developed with the
use of smart consumer
appliances such as
wireless fridges, lighting,
and thermostats have
limited impacts and are
not desirable targets.
Industrial Control Systems, which
automates most critical infrastructures
are now going through an active
transformation to connect to the Internet,
and have been victims of attacks,
extortion where any successful attack
will cause a severe impact to citizens
nationwide.
9. Cyber Attacks Shift Towards Physical Systems
Industrial Control Systems in operational technology creating new points of vulnerabilities
9
97%
3%
Number of Internet-connected ICS devices,
August 2015, Asia Pacific
Connected Devices
Vulnerable Devices
Source: Asia-Pacific Industrial Control Systems Security Report, Frost & Sullivan
N=3087
BLACKOUTto thousands of homes in Western Ukraine,
using the BlackEnergy malware to attack
electric substations. it was reportedly
developed by Moscow-backed group,
Sandworm on 23rd Dec 2015.
Subsequently, its Kiev Airport was attacked
by the same malware during Jan 2016.
Investigations are ongoing.
10. Case analysis – Industrial Control Systems Security
The need to protect SCADA (Supervisory Control and Data Acquisition) systems beyond
the “air gap” concept has been elevated since the 2011 Stuxnet APT attack. Critical
infrastructures using ICS systems and needs to raise the awareness and knowhow of how
to protect these systems as a priority when these systems get connected to the Internet.
Present:
“Air Gap”
Future:
The Internet
Human Machine Interface (HMI)
SCADA,
PLCS
Speed: 500 r/min
Business networks,
connected to the Internet
Industrial networks that runs on
local area networks separated
from the Internet, however still
vulnerable to attacks
Stuxnet malware
installed in USB
drive
External
contractors’
laptop
Information Technology Operational Technology
Graphic source: Vector Open Stock 10Source: Frost & Sullivan
11. Operationalizing the 3C’s for Cyber Security
Cyber Resilience
Risks & Business
Impacts
Cyber Intelligence
Knowledge and correlation of all
threats in the organization
Cyber Protection
Building the right prevention base
“Security by Design”
11Source: Frost & Sullivan
12. Threat Response Adaptive Core Ecosystem (TRACE): Identifying the essentials
Frost & Sullivan believes that adopting a platform approach can operationalize
the vision of a holistic security strategy, comprising the right balance between
security mindsets, tools and skill sets.
Access Management Endpoints Web Assets Cloud App
Security
Content
Integrated Security
Appliances
Advanced Threat
Prevention
Human Factor
Mitigation
Vulnerability
Management
Security
Analytics
T R A C E
12
Source: Frost & Sullivan
13. Projected growth of security solutions in ASEAN, CY2015 (CAGR=20.8%)
Managed Security Services Market Forecast Analysis
-
5.0
10.0
15.0
20.0
25.0
30.0
0.0
100.0
200.0
300.0
400.0
500.0
600.0
2014 2015 2016 2017 2018 2019 2020
Revenue($Million)
GrowthRate(%)
Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
14. Projected growth of security solutions in Indonesia, CY2015 (CAGR=27.1%)
Managed Security Services Market Forecast Analysis
-
5.0
10.0
15.0
20.0
25.0
30.0
35.0
40.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
2014 2015 2016 2017 2018 2019 2020
Revenue($Million)
GrowthRate(%)
Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
15. Network security adoption in Southeast Asia
0.0 20.0 40.0 60.0 80.0 100.0 120.0
Rest of
ASEAN
Philippines
Vietnam
Thailand
Indonesia
Malaysia
Singapore
CY2015 Q3 YTD
CY2014 Total
Network Security Tracker, 2015 QTD Market Size (US$, M)
Indonesia achieved one of the highest growth rates at 30% YoY (Q3 QTD)
Indonesia
Network Security, Indonesia (US$, M)
2014 Q3 QTD 2015 Q3 QTD
16. N = 13,930 qualified information security professionals globally. 10% of
respondents are Asia Pacific
44%
49%
52%
72%
75%
Automated identity management
software
Web security applications
Policy management and audit tools
Improved intrusion detection and
prevention technologies
Network monitoring and intelligence
Top 5 Technologies that Significantly Improve Security
(Percent of Survey Respondents)
18%
23%
35%
Use of Advanced Analytics for
Detection of Advanced Malware
(Percent of Survey
Respondents)
No Plans
Evaluating or Selecting a Solution(s)
Implemented or Implementing
2015 (ISC)2 Global information Security Workforce Study
by Frost & Sullivan
17. 17
“How do you really handle all these… big data?”
- VP for Security Infrastructure, leading telco provider, Indonesia
“We have figured out using using our own designed algorithms across
collected logs, to decipher insider threats”
- Chief Security Officer, leading technology vendor
Opinions from the ground
18. Observation of trends in Security Analytics market
Observations in the security analytics players in APAC
Sold off their IPS offerings, may focus
in other enterprise security products
such as SIEM tools
Integration with endpoint security,
correlation of packets and logs
Launch of X-force exchange,
integration of product and services
business units
19. Observation of trends in Security Analytics market
Observations in the security analytics / threat intelligence players in APAC
Focus on forensics and incident
response capabilities
User behavior analytics using
machine learning systems and
algorithms to identify fraud
Correlation of business and
security intelligence. Position to
block against APT attacks
20. Empowering the cyber defenses in Indonesia
Frost & Sullivan’s End User Research and Advisory Practice
Circular, 4G LTE Vulnerability
Research papers – Frost
Industry Quotient (FIQ) and
Market insights
Threat Intelligence AlertsCyber Security Threats and
Solutions Briefings
21. Cyber Security Outlook for 2016
Building the required capabilities for Cyber Resiliency
21
Improve Cyber
Defense in Critical
Infrastructures
1
Human expertise
and foster
collaboration
2
• Increase of Cyber Security Operation Centers in
the Critical infrastructures.
• Compliance guidelines to ensure cyber resiliency
in both business (IT) and operations (OT)
3
How companies are respondingHow companies are responding
• Cyber security training
• Sharing of intelligence amongst industries
• Setting up cyber security committees
Build a holistic
defense beyond the
organization
• Vendors/contractors to meet security
standards in the process of mitigating chain-
of-trust attacks.
22. Cyber Security Outlook for 2016
Building the required capabilities for Cyber Resiliency
22
Investments into
analytics to improve
accuracy and speed
4
5
• Big data analytics for multiple sources of threat
feeds will become the common concern and
more accurate judgment through automated
algorithms will be needed.
6
How companies are respondingHow companies are responding
• Enterprises will switch from ‘adopting cyber
security for their cloud setup’ to ‘adopting
cloud as part of their cyber security strategy’.
Convergence
security concepts to
be introduced
• Convergence of threats & detection of fraud
between physical and cyber systems
• Developments of convergence security in
smart cities.
Adopting cloud
security as a
strategy
23. Frost & Sullivan, the Growth Partnership Company, works in collaboration with
clients to leverage visionary innovation that addresses the global challenges and
related growth opportunities that will make or break today’s market participants.
For more than 50 years, we have been developing growth strategies for the
Global 1000, emerging businesses, the public sector and the investment
community. Is your organization prepared for the next profound wave of industry
convergence, disruptive technologies, increasing competitive intensity, Mega
Trends, breakthrough best practices, changing customer dynamics and emerging
economies?
www.frost.com