global threat landscape
TRANSCRIPT
![Page 1: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/1.jpg)
Global Threat Landscape
Presentation by Jynette Reed09th February 2015
![Page 2: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/2.jpg)
Agenda
•Threat Landscape•What is an APT•2014 as we know it•Facts•Defining Moments•Why Care•Security Strategies•Mandiant
![Page 3: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/3.jpg)
Introduction to the Global Threat1. Thousands of IT Systems are compromised every day
2. Attacks can be political but most commonly are to steal money or secrets
3. The magnitude of the attacks pose a real threat to Britain's economic state
4. No such thing as 100% Protection
![Page 4: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/4.jpg)
Definition - What is an APT
An advanced persistent threat is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.
The purpose of an APT attack is to steal data rather than to cause damage.
What distinguishes an APT from other threats is it is targeted, persistent, evasive and advanced
![Page 5: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/5.jpg)
2014 – IF ONLY WE KNEW
Security breaches are inevitable
Headliners
•Sony•JP Morgan•PSN – DDOS•Home Depot
![Page 6: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/6.jpg)
Statistics
Headliners
•Sony•JP Morgan•PSN – DDOS•Home Depot
![Page 7: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/7.jpg)
Why should you care?
•Data Destroyed, Stolen, Exposed
•Present and former employees personally impacted
•Lawsuits
•Brand Damage
•REPUTATION
•Decrease in share prices
![Page 8: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/8.jpg)
Q. A Disaster puts you at risk and you’re off limits for 3 days. Are you?
A, Well Prepared
B, Somewhat Prepared
C, Not clear
D, In Deep Trouble
![Page 9: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/9.jpg)
Security Strategies:•To attack the security gap, organizations need smart people, visibility into their networks, endpoints and logs.
•Organisations also need actionable threat intelligence that identifies malicious activity faster.
•Protecting your computer with a standalone anti-virus solution only is simply no longer enough to protect your devices and your sensitive information.
•A comprehensive, 360-degree security solution is entry level protection
Breaches are inevitable — how will you cope
![Page 10: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/10.jpg)
Mandiant a helping hand• Mandiant is the ONLY information security company that can show:
• WHEN • IMPACT
• More than 30% of the Fortune 100 have turned to us when they’ve been under assault
• We Complement Your Capabilities With Ours
There Is Strength In Fingerprints
• We Have Undisputed Experts
![Page 11: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/11.jpg)
Why Mandiant
Because hunting down APT’s is not as easy as this!
![Page 12: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/12.jpg)
The Year Ahead• In 2015 the public and press will be on high alert
Re: privacy and security
• Malicious messages that look like the real thing
• Ransomware moves into the cloud and onto your phone
• Point-of-sale attacks
• Targeting the 'one percent‘
![Page 13: Global threat landscape](https://reader035.vdocuments.us/reader035/viewer/2022081604/587e48a61a28abeb1a8b4903/html5/thumbnails/13.jpg)
Conclusion
You will be breached, it may not be now and it may not be big but it will happen!!.
Are you ready for it?
Any questions?