SlideShare a Scribd company logo
1 of 7
Redrawing the Cyber
Defense Frontier

Dr. Joe Hage

© 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved.

1
Information Security Challenges –
1/2
• Senior management, often times, disengaged and
apathetic toward information security
• Information security initiatives are sometimes
checkboxes for regulatory compliance purposes
• Information security tends to be considered as an
impediment to business progress and agility
• Employees lacking information security awareness
© 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved.

2
Information Security Challenges –
2/2
• Information security is often an afterthought in
software development life cycle (SDLC)
• Industrialization and nationalization of hackers
• Loss of control over accessibility and usage as
everyone keeps bringing their own portable
devices to work
• The mushrooming cloud is eliminating boundaries
and security perimeters
© 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved.

3
Facts: The Mushrooming Cloud
• Infrastructure-as-a-Service (IaaS), e.g. Amazon EC2
• Platform-as-a-service (PaaS), tools and services used to develop
and deploy applications, e.g. Google App Engine
• Software-as-a-service (SaaS) such as Salesforce.com, Microsoft
Office 365, and Google Docs
• Storage-as-a-service (SaaS), file storage and sharing services
like Dropbox and SkyDrive
• “The Internet of Things” – Billions of connected devices
– 25 Billion devices by 2015 (Source: Cisco)
– 50 Billion devices by 2020 (Source: Cisco, Forbes)
© 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved.

4
Facts: Everyone is Vulnerable
• Traditional defenses are inadequate
–
–
–
–
–
–
–

Anti-Malware
Anti-Virus
Anti-Spyware
Anti-Phishing
Firewalls and Filters
Intrusion Detection
Data Loss Prevention

• Every device, user, application, or web page are potential
threats forcing enterprises to limit usage and restrict access
© 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved.

5
Solution: Redraw Cyber Defense
Frontier
• Collect and analyze data and patterns to set baseline
• Monitor and detect anomalies
• Predictive Failure Analysis
–
–
–
–
–
–
–

Content
System Transactions
User Activities
User Behaviors (which may vary depending on device used)
Application Behaviors
Data Patterns
Network Traffic

© 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved.

6
Dr. Joe Hage’s Contact Info
•
•
•
•
•
•
•

E-mail: DR@JOE.ME
Skype: joe_hage
Web: www.joe.me
LinkedIn: http://www.linkedin.com/in/joehage
Twitter: http://twitter.com/DrJoeHage
Facebook: http://facebook.com/DrJoeHage
Amazon: http://www.amazon.com/author/joe-hage

© 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved.

7

More Related Content

What's hot

Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | SecloreSeclore
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge Pereira
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersFeisal Nanji
 
I365 presentation
I365 presentationI365 presentation
I365 presentationMCS621
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreSeclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challengesHadi Fadlallah
 
Securing Remote Workforce | Seclore
Securing Remote Workforce | SecloreSecuring Remote Workforce | Seclore
Securing Remote Workforce | SecloreSeclore
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 

What's hot (20)

Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
I365 presentation
I365 presentationI365 presentation
I365 presentation
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
Data security
Data securityData security
Data security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Data security
Data securityData security
Data security
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
Securing Remote Workforce | Seclore
Securing Remote Workforce | SecloreSecuring Remote Workforce | Seclore
Securing Remote Workforce | Seclore
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Data Security
Data SecurityData Security
Data Security
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 

Viewers also liked

الباب الأول 1ث 2015 منسق
الباب الأول 1ث 2015 منسقالباب الأول 1ث 2015 منسق
الباب الأول 1ث 2015 منسقMoonly Taha
 
Новый закон
Новый законНовый закон
Новый законNik789
 
Katalog 02 2014(украина)
Katalog 02 2014(украина)Katalog 02 2014(украина)
Katalog 02 2014(украина)zaraza44
 
Exámen Power Point
Exámen Power PointExámen Power Point
Exámen Power Pointthhalatinass
 
The Edge April 2016 Cover Story
The Edge April 2016 Cover StoryThe Edge April 2016 Cover Story
The Edge April 2016 Cover StoryAmeen Kader
 
Temelji konkurencije
Temelji konkurencijeTemelji konkurencije
Temelji konkurencijeMario Zovko
 
ТЕХКОМ-минитрастер ЭРМД-грант
ТЕХКОМ-минитрастер ЭРМД-грантТЕХКОМ-минитрастер ЭРМД-грант
ТЕХКОМ-минитрастер ЭРМД-грантЧернышёв Михаил
 
Agile - Distributed at Scale
Agile - Distributed at ScaleAgile - Distributed at Scale
Agile - Distributed at ScaleGraham Dick
 
اولى ثانوى
اولى ثانوىاولى ثانوى
اولى ثانوىMoonly Taha
 
BIM story in QCN Year Book 2015
BIM story in QCN Year Book 2015BIM story in QCN Year Book 2015
BIM story in QCN Year Book 2015Ameen Kader
 
Katalog 02 2014(украина)
Katalog 02 2014(украина)Katalog 02 2014(украина)
Katalog 02 2014(украина)zaraza44
 
Tugas bulan 3 ketahanan nasional
Tugas bulan 3 ketahanan nasionalTugas bulan 3 ketahanan nasional
Tugas bulan 3 ketahanan nasionalAlfi Nugraha
 
Market Research -by Jessie A. - Knowing Our Customers
Market Research -by Jessie A. -  Knowing Our CustomersMarket Research -by Jessie A. -  Knowing Our Customers
Market Research -by Jessie A. - Knowing Our Customersjesap1976
 

Viewers also liked (20)

الباب الأول 1ث 2015 منسق
الباب الأول 1ث 2015 منسقالباب الأول 1ث 2015 منسق
الباب الأول 1ث 2015 منسق
 
Новый закон
Новый законНовый закон
Новый закон
 
Katalog 02 2014(украина)
Katalog 02 2014(украина)Katalog 02 2014(украина)
Katalog 02 2014(украина)
 
QUIZ FOR BEGINNERS
QUIZ FOR BEGINNERSQUIZ FOR BEGINNERS
QUIZ FOR BEGINNERS
 
Exámen Power Point
Exámen Power PointExámen Power Point
Exámen Power Point
 
The Edge April 2016 Cover Story
The Edge April 2016 Cover StoryThe Edge April 2016 Cover Story
The Edge April 2016 Cover Story
 
CANSA No Tobacco campaign 2014 Afrikaans
CANSA No Tobacco campaign 2014 AfrikaansCANSA No Tobacco campaign 2014 Afrikaans
CANSA No Tobacco campaign 2014 Afrikaans
 
Temelji konkurencije
Temelji konkurencijeTemelji konkurencije
Temelji konkurencije
 
ТЕХКОМ-минитрастер ЭРМД-грант
ТЕХКОМ-минитрастер ЭРМД-грантТЕХКОМ-минитрастер ЭРМД-грант
ТЕХКОМ-минитрастер ЭРМД-грант
 
Agile - Distributed at Scale
Agile - Distributed at ScaleAgile - Distributed at Scale
Agile - Distributed at Scale
 
اولى ثانوى
اولى ثانوىاولى ثانوى
اولى ثانوى
 
ТЕХКОМ-электроник 2014
ТЕХКОМ-электроник 2014ТЕХКОМ-электроник 2014
ТЕХКОМ-электроник 2014
 
Tqm
TqmTqm
Tqm
 
BIM story in QCN Year Book 2015
BIM story in QCN Year Book 2015BIM story in QCN Year Book 2015
BIM story in QCN Year Book 2015
 
Katalog 02 2014(украина)
Katalog 02 2014(украина)Katalog 02 2014(украина)
Katalog 02 2014(украина)
 
Tugas bulan 3 ketahanan nasional
Tugas bulan 3 ketahanan nasionalTugas bulan 3 ketahanan nasional
Tugas bulan 3 ketahanan nasional
 
ART RELIGIÓS
ART RELIGIÓSART RELIGIÓS
ART RELIGIÓS
 
Valuaciones
ValuacionesValuaciones
Valuaciones
 
Market Research -by Jessie A. - Knowing Our Customers
Market Research -by Jessie A. -  Knowing Our CustomersMarket Research -by Jessie A. -  Knowing Our Customers
Market Research -by Jessie A. - Knowing Our Customers
 
Xpress Your garden
Xpress Your gardenXpress Your garden
Xpress Your garden
 

Similar to Redrawing the Cyber Defense Frontier

Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsMichael Scheidell
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentityFredBrandonAuthorMCP
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_shTomppa Järvinen
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 

Similar to Redrawing the Cyber Defense Frontier (20)

Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and Identity
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_sh
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 

Recently uploaded

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 

Recently uploaded (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 

Redrawing the Cyber Defense Frontier

  • 1. Redrawing the Cyber Defense Frontier Dr. Joe Hage © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 1
  • 2. Information Security Challenges – 1/2 • Senior management, often times, disengaged and apathetic toward information security • Information security initiatives are sometimes checkboxes for regulatory compliance purposes • Information security tends to be considered as an impediment to business progress and agility • Employees lacking information security awareness © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 2
  • 3. Information Security Challenges – 2/2 • Information security is often an afterthought in software development life cycle (SDLC) • Industrialization and nationalization of hackers • Loss of control over accessibility and usage as everyone keeps bringing their own portable devices to work • The mushrooming cloud is eliminating boundaries and security perimeters © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 3
  • 4. Facts: The Mushrooming Cloud • Infrastructure-as-a-Service (IaaS), e.g. Amazon EC2 • Platform-as-a-service (PaaS), tools and services used to develop and deploy applications, e.g. Google App Engine • Software-as-a-service (SaaS) such as Salesforce.com, Microsoft Office 365, and Google Docs • Storage-as-a-service (SaaS), file storage and sharing services like Dropbox and SkyDrive • “The Internet of Things” – Billions of connected devices – 25 Billion devices by 2015 (Source: Cisco) – 50 Billion devices by 2020 (Source: Cisco, Forbes) © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 4
  • 5. Facts: Everyone is Vulnerable • Traditional defenses are inadequate – – – – – – – Anti-Malware Anti-Virus Anti-Spyware Anti-Phishing Firewalls and Filters Intrusion Detection Data Loss Prevention • Every device, user, application, or web page are potential threats forcing enterprises to limit usage and restrict access © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 5
  • 6. Solution: Redraw Cyber Defense Frontier • Collect and analyze data and patterns to set baseline • Monitor and detect anomalies • Predictive Failure Analysis – – – – – – – Content System Transactions User Activities User Behaviors (which may vary depending on device used) Application Behaviors Data Patterns Network Traffic © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 6
  • 7. Dr. Joe Hage’s Contact Info • • • • • • • E-mail: DR@JOE.ME Skype: joe_hage Web: www.joe.me LinkedIn: http://www.linkedin.com/in/joehage Twitter: http://twitter.com/DrJoeHage Facebook: http://facebook.com/DrJoeHage Amazon: http://www.amazon.com/author/joe-hage © 2008-2014. Copyright, Dr. Joe Hage. Proprietary Information. All Rights Reserved. 7