SlideShare a Scribd company logo
SECURITY AWARENESS SERIES
TOP 5 SECURITY ISSUES FOR 2012

                Presented By:
                Joe Schorr
                Principal Security Architect




                                     Jschorr@cbihome.com
Agenda


• Current Events
• Top 5 Security Issues in 2012
• Self-Defense Online
• Tips for home
• Next Steps
• Q&A
• Glossary of Terms



 2                                                 Jschorr@cbihome.com
                                  800.747.8585 | comerica@cbihome.com
Security Trends

                                               CHALLENGING
                                             THREAT LANDSCAPE


                                                                  MALICIOUS INSIDERS
                                    TARGETED ATTACKS




                 EVOLVING                                                                      INCREASING
                                                 INCREASING FINANCIAL
         INFRASTRUCTURE                                                                        COMPLEXITY
                                                       AND BRAND RISK




                                                                                                             COMPLIANCE
                                                                                       DATA GROWTH          REQUIREMENTS
        MOBILE              VIRTUALIZATION




                                                                                               VENDOR COMPLEXITY
                    CLOUD


                                                                                                              Jschorr@cbihome.com
                                                                                             800.747.8585 | comerica@cbihome.com
State of Security




    Source: 2011 Symantec State of Security Survey
4                                                                     Jschorr@cbihome.com
                                                     800.747.8585 | comerica@cbihome.com
Recent Events – ‘The Year of The Hacker’




5                                                           Jschorr@cbihome.com
                                           800.747.8585 | comerica@cbihome.com
Recent Events – Personal Information Lost




6                                                        Jschorr@cbihome.com
                                        800.747.8585 | comerica@cbihome.com
Top 5 Security Issues in 2012


           Mobile Security

                                   Cloud Security



         Malware and Viruses


                                   Data Leakage


           Targeted Attacks




7                                                           Jschorr@cbihome.com
                                           800.747.8585 | comerica@cbihome.com
Mobile Security


                                                                And yet…
                           29% of enterprises use tablets today1
                           67% intend to in the next year1
                           60+ million iPads® in less than 2 years2
                           75% of Fortune 500 testing and
                           deploying iPads3


                     Q1 2012 – The Mobile Tsunami Arrives:
                  • Execs (and others) are bringing in iPads,
                    Tablets and Smart Phones with or without
                    permission
                  • Comingling of personal and corporate apps
                    heightens risk to data
                  • Primary concern is email, followed by web,
                    file sharing, social media & other cloud-
                    based that use web to share data
                         1 Morgan Stanley Research Blue Paper: “Tablet Demand and Disruption”, Feb. 2011
                         2 Forecast: Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update, 16 Sept. 2011, Gartner
                         3 Apple CFO, Apple earnings call, April 2011

8                                                                    Jschorr@cbihome.com
                                                    800.747.8585 | comerica@cbihome.com
Mobile Security - Tips



                    Audit your current state




                        Create a policy!




                        Assess your Plan



                         Invest in Mobile
                          Management


9                                                                Jschorr@cbihome.com
                                                800.747.8585 | comerica@cbihome.com
Cloud Security – Attractive but Challenging


                                 Talent
                                 • Do you have knowledgable Security staff?
                                 • Can you invest in developing them going
                                   forward?



                                 Time
                                 • 24/7 management
                                 • 24/7 incident response




                                 Technology
         Time
                                 • Up-to-date, optimal mix of defensive
                                   solutions
                Tech             • If your working methods change, does
       Talent                      security keep pace


10                                                              Jschorr@cbihome.com
                                               800.747.8585 | comerica@cbihome.com
Cloud Security - Tips


                        Check the reputation of
                        the Service Provider


                        How does the Provider
                        address your security
                                needs

                      Research Service Level
                   Agreements, Certifications
                      and Disaster Recovery


                    Try it! Cloud makes it easy
                      to ‘turn on/turn off’


11                                                                 Jschorr@cbihome.com
                                                  800.747.8585 | comerica@cbihome.com
Malware and Viruses




     SMB Threat Awareness Poll Global Results 2011
12                                                                    Jschorr@cbihome.com
                                                     800.747.8585 | comerica@cbihome.com
Malware and Viruses - Tips



                   Conduct a ‘Healthcheck’ of
                    your current defenses



                    Review the results and
                  match against your security
                             needs



                   Ensure you are updated and
                   using all standard features


13                                                                 Jschorr@cbihome.com
                                                  800.747.8585 | comerica@cbihome.com
Data Leakage:
Intellectual Property (IP) and Personal Info (PII)




                                                     + Billion/year
                                                     $6
                                                             =
14                                                                         Jschorr@cbihome.com
                                                          800.747.8585 | comerica@cbihome.com
Data Leakage Tips



                    Classify your data!


                    Create a IP PII policy
                    (what is and isn’t
                       allowed out)


                       Perform a Risk
                       Assessment


                    Factor ‘Data Leakage’
                    protection into the
                        security plan
15                                                            Jschorr@cbihome.com
                                             800.747.8585 | comerica@cbihome.com
Targeted Attacks


     Phishing is a well-known type of hacking attack using spam
     emails to trick the recipient into clicking a link or opening
     an attachment in order to get control of their computer.
     Spear Phishing is a newer, targeted attack using email.
     These attacks are random but more often the persistent
     efforts of criminal enterprises, or state-sponsored
     professionals seeking trade secrets, financial gain or
     military intelligence.
     Spear Phishing uses social engineering techniques and
     appear to come from within a person’s place of
     employment, an authority figure or a friend.
16                                                             Jschorr@cbihome.com
                                              800.747.8585 | comerica@cbihome.com
What this looks like to you….

1. The targeted person receives the fake email
2. User follows instructions on false site they are directed to
3. Or… the user opens a malicious payload in an attachment




17                                                                                 Jschorr@cbihome.com
                                                                  800.747.8585 | comerica@cbihome.com
Online Defense Tips


     1. REVIEW! Your personal information on the internet
        and social networking sites immediately. Start to
        look at your online persona as an attacker would.




18                                                          Jschorr@cbihome.com
                                           800.747.8585 | comerica@cbihome.com
Online Defense Tips


     2. SANITIZE! Your online life. Remove references to
        personal information on social networking and social
        media sites. Even family info, photos and hobbies
        can be used against you and your company.




19                                                            Jschorr@cbihome.com
                                             800.747.8585 | comerica@cbihome.com
Online Defense Tips


     3. DON’T! Click links or respond to mysterious email
        messages. Double-check the authenticity especially if
        they seem abnormally urgent. Examine the link
        names.




20                                                            Jschorr@cbihome.com
                                             800.747.8585 | comerica@cbihome.com
Online Defense Tips

     4. UPDATE! And patch your anti-virus software. Many
        attackers make use of ‘zero-day’ or very new viruses
        and attack vectors. Keeping up to date is your best
        defense against new malware.




21                                                             Jschorr@cbihome.com
                                              800.747.8585 | comerica@cbihome.com
Online Defense Tips

 5. TURN ON! All the features on your security software.
    Make sure that all elements of the solution are
    enabled and active. It does no good if your anti-virus
    is ‘On’ but the firewall or email filters are ‘Off’.




22                                                          Jschorr@cbihome.com
                                           800.747.8585 | comerica@cbihome.com
Tips for Home




http://www.connectsafely.org/   http://www.staysafeonline.org     http://us.norton.com/content/en
pdfs/fbparents.pdf              /sites/default/files/resource_d   /us/home_homeoffice/media/the
                                ocuments/Parents%20Internet       me/parentresources/FamilyOnlin
                                %20Safety%20and%20Security          eSafetyGuide_3rdEd_final.pdf
                                %20STC.pdf
23                                                                                   Jschorr@cbihome.com
                                                                    800.747.8585 | comerica@cbihome.com
Next Steps


     • Publish a corporate policy for public information
     • Prohibit publication of org charts, personal info, phone lists,
       customer lists, etc.


     • Implement awareness training for your employees
     • Let them know they are targets and what attackers want to
       know


     • Create a Response Strategy
     • Begin to track the kinds of ‘spam’ you’re getting (you may be
       targeted and not realize it)


     • Contact CBI for assistance with these and other information
       security and security awareness issues, including security and
       vulnerability assessments




24                                                                                        Jschorr@cbihome.com
                                                                         800.747.8585 | comerica@cbihome.com
MVAS Services
(Managed Vulnerability Assessment Services)


MVAS was developed and
                                                    Conduct
created in response to many                         Baseline
clients requesting ongoing                         Assessment

vulnerability assessments from
                                    Remediate
CBI                                 Identified
                                                                       Presentation
                                                                        of Results
                                      Risks

Generally these clients require a
more frequent occurrence of
assessment testing based on
different variables:
                                                                        Remediate
     • Regulatory Compliance        Presentation
                                     of Results
                                                                        Identified
                                                                          Risks
     • Due Diligence
     • Highly volatile Threat
                                                    Conduct
        Landscape                                   Quarterly
                                                   Assessment
     • Previous Incidents

25                                                                          Jschorr@cbihome.com
                                                           800.747.8585 | comerica@cbihome.com
THANK YOU
jschorr@cbihome.com
   @JoeSchorr

More Related Content

What's hot

Swenson Group Vvma
Swenson Group VvmaSwenson Group Vvma
Swenson Group Vvma
mhunter22
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
Morten Bjørklund
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Fernando Reiser
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
Dale Butler
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
Infinity Technologies
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
DFLABS SRL
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
Jorge Sebastiao
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
DFLABS SRL
 
Sem 001 sem-001
Sem 001 sem-001Sem 001 sem-001
Sem 001 sem-001
SelectedPresentations
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
John Palfreyman
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
Dominic Vogel
 
Security as the foundation of DX
Security as the foundation of DXSecurity as the foundation of DX
Security as the foundation of DX
masaaki murakami
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Brief
mageeb
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
wardell henley
 
7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security
Cindy Kim
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Priyanka Aash
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
Kim Aarenstrup
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
jaredcarst
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
SlideTeam
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
Mike Murray
 

What's hot (20)

Swenson Group Vvma
Swenson Group VvmaSwenson Group Vvma
Swenson Group Vvma
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk Assessments
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Sem 001 sem-001
Sem 001 sem-001Sem 001 sem-001
Sem 001 sem-001
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Security as the foundation of DX
Security as the foundation of DXSecurity as the foundation of DX
Security as the foundation of DX
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Brief
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
 

Viewers also liked

APT Webinar
APT WebinarAPT Webinar
APT Webinar
Joseph Schorr
 
Eric Nye Portfolio 2011 Fine Art
Eric Nye Portfolio 2011 Fine ArtEric Nye Portfolio 2011 Fine Art
Eric Nye Portfolio 2011 Fine Art
ericnye
 
The Continuum of Certainty and Threshold
The Continuum of Certainty and ThresholdThe Continuum of Certainty and Threshold
The Continuum of Certainty and Threshold
AzulCora
 
GMADE presentation
GMADE presentationGMADE presentation
GMADE presentation
saraknic
 
HIPAA Preso
HIPAA PresoHIPAA Preso
HIPAA Preso
Joseph Schorr
 
Intermediate Accounting . CH 18 . by MidoCool
Intermediate Accounting . CH 18 . by MidoCoolIntermediate Accounting . CH 18 . by MidoCool
Intermediate Accounting . CH 18 . by MidoCool
Mahmoud Mohamed
 

Viewers also liked (6)

APT Webinar
APT WebinarAPT Webinar
APT Webinar
 
Eric Nye Portfolio 2011 Fine Art
Eric Nye Portfolio 2011 Fine ArtEric Nye Portfolio 2011 Fine Art
Eric Nye Portfolio 2011 Fine Art
 
The Continuum of Certainty and Threshold
The Continuum of Certainty and ThresholdThe Continuum of Certainty and Threshold
The Continuum of Certainty and Threshold
 
GMADE presentation
GMADE presentationGMADE presentation
GMADE presentation
 
HIPAA Preso
HIPAA PresoHIPAA Preso
HIPAA Preso
 
Intermediate Accounting . CH 18 . by MidoCool
Intermediate Accounting . CH 18 . by MidoCoolIntermediate Accounting . CH 18 . by MidoCool
Intermediate Accounting . CH 18 . by MidoCool
 

Similar to Security awarenesspreso draft-v-11

Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
Interop
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
Santiago Cavanna
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
Iqra khalil
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
gueste69f645
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
Nandita Nityanandam
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
David J Rosenthal
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
Symosis Security (Previously C-Level Security)
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
cVidya Networks
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
Vincent Kwon
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
xband
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
Phil Huggins FBCS CITP
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
Marc Vael
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Impetus Technologies
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
Susan Darby
 
Securing Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderSecuring Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service Provider
Datapipe
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
Rafal Los
 

Similar to Security awarenesspreso draft-v-11 (20)

Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
Securing Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderSecuring Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service Provider
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Security awarenesspreso draft-v-11

  • 1. SECURITY AWARENESS SERIES TOP 5 SECURITY ISSUES FOR 2012 Presented By: Joe Schorr Principal Security Architect Jschorr@cbihome.com
  • 2. Agenda • Current Events • Top 5 Security Issues in 2012 • Self-Defense Online • Tips for home • Next Steps • Q&A • Glossary of Terms 2 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 3. Security Trends CHALLENGING THREAT LANDSCAPE MALICIOUS INSIDERS TARGETED ATTACKS EVOLVING INCREASING INCREASING FINANCIAL INFRASTRUCTURE COMPLEXITY AND BRAND RISK COMPLIANCE DATA GROWTH REQUIREMENTS MOBILE VIRTUALIZATION VENDOR COMPLEXITY CLOUD Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 4. State of Security Source: 2011 Symantec State of Security Survey 4 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 5. Recent Events – ‘The Year of The Hacker’ 5 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 6. Recent Events – Personal Information Lost 6 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 7. Top 5 Security Issues in 2012  Mobile Security  Cloud Security  Malware and Viruses  Data Leakage  Targeted Attacks 7 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 8. Mobile Security And yet… 29% of enterprises use tablets today1 67% intend to in the next year1 60+ million iPads® in less than 2 years2 75% of Fortune 500 testing and deploying iPads3 Q1 2012 – The Mobile Tsunami Arrives: • Execs (and others) are bringing in iPads, Tablets and Smart Phones with or without permission • Comingling of personal and corporate apps heightens risk to data • Primary concern is email, followed by web, file sharing, social media & other cloud- based that use web to share data 1 Morgan Stanley Research Blue Paper: “Tablet Demand and Disruption”, Feb. 2011 2 Forecast: Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update, 16 Sept. 2011, Gartner 3 Apple CFO, Apple earnings call, April 2011 8 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 9. Mobile Security - Tips  Audit your current state  Create a policy!  Assess your Plan Invest in Mobile  Management 9 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 10. Cloud Security – Attractive but Challenging Talent • Do you have knowledgable Security staff? • Can you invest in developing them going forward? Time • 24/7 management • 24/7 incident response Technology Time • Up-to-date, optimal mix of defensive solutions Tech • If your working methods change, does Talent security keep pace 10 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 11. Cloud Security - Tips Check the reputation of  the Service Provider How does the Provider  address your security needs Research Service Level  Agreements, Certifications and Disaster Recovery Try it! Cloud makes it easy  to ‘turn on/turn off’ 11 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 12. Malware and Viruses SMB Threat Awareness Poll Global Results 2011 12 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 13. Malware and Viruses - Tips Conduct a ‘Healthcheck’ of  your current defenses Review the results and  match against your security needs Ensure you are updated and  using all standard features 13 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 14. Data Leakage: Intellectual Property (IP) and Personal Info (PII) + Billion/year $6 = 14 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 15. Data Leakage Tips  Classify your data! Create a IP PII policy  (what is and isn’t allowed out) Perform a Risk  Assessment Factor ‘Data Leakage’  protection into the security plan 15 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 16. Targeted Attacks Phishing is a well-known type of hacking attack using spam emails to trick the recipient into clicking a link or opening an attachment in order to get control of their computer. Spear Phishing is a newer, targeted attack using email. These attacks are random but more often the persistent efforts of criminal enterprises, or state-sponsored professionals seeking trade secrets, financial gain or military intelligence. Spear Phishing uses social engineering techniques and appear to come from within a person’s place of employment, an authority figure or a friend. 16 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 17. What this looks like to you…. 1. The targeted person receives the fake email 2. User follows instructions on false site they are directed to 3. Or… the user opens a malicious payload in an attachment 17 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 18. Online Defense Tips 1. REVIEW! Your personal information on the internet and social networking sites immediately. Start to look at your online persona as an attacker would. 18 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 19. Online Defense Tips 2. SANITIZE! Your online life. Remove references to personal information on social networking and social media sites. Even family info, photos and hobbies can be used against you and your company. 19 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 20. Online Defense Tips 3. DON’T! Click links or respond to mysterious email messages. Double-check the authenticity especially if they seem abnormally urgent. Examine the link names. 20 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 21. Online Defense Tips 4. UPDATE! And patch your anti-virus software. Many attackers make use of ‘zero-day’ or very new viruses and attack vectors. Keeping up to date is your best defense against new malware. 21 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 22. Online Defense Tips 5. TURN ON! All the features on your security software. Make sure that all elements of the solution are enabled and active. It does no good if your anti-virus is ‘On’ but the firewall or email filters are ‘Off’. 22 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 23. Tips for Home http://www.connectsafely.org/ http://www.staysafeonline.org http://us.norton.com/content/en pdfs/fbparents.pdf /sites/default/files/resource_d /us/home_homeoffice/media/the ocuments/Parents%20Internet me/parentresources/FamilyOnlin %20Safety%20and%20Security eSafetyGuide_3rdEd_final.pdf %20STC.pdf 23 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 24. Next Steps • Publish a corporate policy for public information • Prohibit publication of org charts, personal info, phone lists, customer lists, etc. • Implement awareness training for your employees • Let them know they are targets and what attackers want to know • Create a Response Strategy • Begin to track the kinds of ‘spam’ you’re getting (you may be targeted and not realize it) • Contact CBI for assistance with these and other information security and security awareness issues, including security and vulnerability assessments 24 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com
  • 25. MVAS Services (Managed Vulnerability Assessment Services) MVAS was developed and Conduct created in response to many Baseline clients requesting ongoing Assessment vulnerability assessments from Remediate CBI Identified Presentation of Results Risks Generally these clients require a more frequent occurrence of assessment testing based on different variables: Remediate • Regulatory Compliance Presentation of Results Identified Risks • Due Diligence • Highly volatile Threat Conduct Landscape Quarterly Assessment • Previous Incidents 25 Jschorr@cbihome.com 800.747.8585 | comerica@cbihome.com