ola wittenby - hotlandskapet på internet

17
© 2014 IBM Corporation BusinessConnect A New Era of Smart Hotlandskapet på Internet Ola Wittenby [email protected] Stockholm 2014-10-07

Upload: ibm-sverige

Post on 04-Dec-2014

83 views

Category:

Technology


0 download

DESCRIPTION

Att bekämpa brott på internet blir för de flesta företag inte lättare med tiden. Cyberbrottslingar ökar hela tiden takt och sinnrikhet i deras attacker. Tekniken och tillvägagångssätten förbättras stadigt och attackerna blir ännu svårare att hitta och hindra.

TRANSCRIPT

Page 1: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation

BusinessConnectA New Era of Smart

Hotlandskapet på Internet

Ola [email protected]

Stockholm 2014-10-07

Page 2: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation2

A New Era of Smart

2

Page 3: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation3

A New Era of Smart

A new security reality is here

61%

data theft and cybercrimeare their greatest threats2012 IBM Global Reputational Risk & IT Study

of organizations say

Average cost of adata breach

2014 Cost of Data Breach, Ponemon Institute

$3.5M

70%of security

executives have cloud and mobile security concerns2013 IBM CISO Survey

Mobile malware growthin just one year

2012 - 2013 Juniper Mobile Threat Report

614% security tools from

vendors

8545

IBM client example

83%of enterprises

have difficulty finding the security skills they need2012 ESG Research

Page 4: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation4

A New Era of Smart

4

Page 5: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation5

A New Era of Smart

5

We are in an era of continous breaches

Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014

Near Daily Leaks of Sensitive Data

40% increase in reported data

breaches and incidents

Relentless Use of Multiple Methods

500,000,000+ records were leaked, while the future

shows no sign of change

2011 2012 2013

SQL injection

Spear phishing

DDoS Third-party software

Physical access

Malware XSS Watering hole

Undisclosed

Attack types

Note: Size of circle estimates relative impact of incident in terms of cost to business.

Page 6: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation6

A New Era of Smart

6

The cybercrime ecosystem

Developer / Malware writer

Exploiter / Distributor•Spam•Phishing•Pharming•Social Engineering

Hosting / Outsourcing

Page 7: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation7

A New Era of Smart

7

One-day attack methods demonstrate how quickly attackers rush to exploit a vulnerability

Page 8: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation8

A New Era of Smart

8

Attackers optimize and refine target selection

Page 9: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation9

A New Era of Smart

9

Effectively targeting end-users

MalvertisingWatering Hole Attacker injects malware

on special interest website Vulnerable niche users

exploited

Attacker injects malwareon ad network

Malicious ad embedded on legitimate websites

Vulnerable users exploited

Page 10: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation10

A New Era of Smart

10

Spam continues to be a main channel for malware into companies

In March 2014, we saw the highest levels of spam measured during the last two and a half years.

Page 11: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation11

A New Era of Smart

11

Significant increase in Java vulnerabilities

Page 12: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation12

A New Era of Smart

12

Weponized content focused on end-user applications

Page 13: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation13

A New Era of Smart

13

Attackers exploit application vulnerabilities to access sensitive data

Not testing puts the organization at risk.

Broken authentication can result in that the attacker looks like a legitimate user.

Bugs means increased risks for loss of critical information.

Mitigating potential damages makes cleanup a challenge.

of organizations underestimate the number of web applications they have deployed50%

Plan incident response for the unkown rather than the known.

Test and Remediate AppVulns

Protect Web Servers

Expect the Unexpected

Page 14: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation14

A New Era of Smart

14

Attackers use exploit kits to deliver payload

Styx Exploit Kit

Rising in popularity

Successful in exploiting IE and Firefox on Windows

Page 15: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation15

A New Era of Smart

15

The cybercrime ecosystem

Developer / Malware writer

Exploiter / Distributor•Spam•Phishing•Pharming•Social Engineering

Hosting / Outsourcing

Criminals just buy what they need…

•Weaponized content (Malware) •Delivery (spam, phishing, pharming…)•Hosting•SLA

Or just rent a hacker to get what they need…

•Industrial espionage•Bank fraud

Page 16: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation16

A New Era of Smart

16

Page 17: Ola Wittenby - Hotlandskapet på Internet

© 2014 IBM Corporation17

A New Era of Smart

www.ibm.com/security

© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.