ola wittenby - hotlandskapet på internet
DESCRIPTION
Att bekämpa brott på internet blir för de flesta företag inte lättare med tiden. Cyberbrottslingar ökar hela tiden takt och sinnrikhet i deras attacker. Tekniken och tillvägagångssätten förbättras stadigt och attackerna blir ännu svårare att hitta och hindra.TRANSCRIPT
© 2014 IBM Corporation
BusinessConnectA New Era of Smart
Hotlandskapet på Internet
Stockholm 2014-10-07
© 2014 IBM Corporation2
A New Era of Smart
2
© 2014 IBM Corporation3
A New Era of Smart
A new security reality is here
61%
data theft and cybercrimeare their greatest threats2012 IBM Global Reputational Risk & IT Study
of organizations say
Average cost of adata breach
2014 Cost of Data Breach, Ponemon Institute
$3.5M
70%of security
executives have cloud and mobile security concerns2013 IBM CISO Survey
Mobile malware growthin just one year
2012 - 2013 Juniper Mobile Threat Report
614% security tools from
vendors
8545
IBM client example
83%of enterprises
have difficulty finding the security skills they need2012 ESG Research
© 2014 IBM Corporation4
A New Era of Smart
4
© 2014 IBM Corporation5
A New Era of Smart
5
We are in an era of continous breaches
Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014
Near Daily Leaks of Sensitive Data
40% increase in reported data
breaches and incidents
Relentless Use of Multiple Methods
500,000,000+ records were leaked, while the future
shows no sign of change
2011 2012 2013
SQL injection
Spear phishing
DDoS Third-party software
Physical access
Malware XSS Watering hole
Undisclosed
Attack types
Note: Size of circle estimates relative impact of incident in terms of cost to business.
© 2014 IBM Corporation6
A New Era of Smart
6
The cybercrime ecosystem
Developer / Malware writer
Exploiter / Distributor•Spam•Phishing•Pharming•Social Engineering
Hosting / Outsourcing
© 2014 IBM Corporation7
A New Era of Smart
7
One-day attack methods demonstrate how quickly attackers rush to exploit a vulnerability
© 2014 IBM Corporation8
A New Era of Smart
8
Attackers optimize and refine target selection
© 2014 IBM Corporation9
A New Era of Smart
9
Effectively targeting end-users
MalvertisingWatering Hole Attacker injects malware
on special interest website Vulnerable niche users
exploited
Attacker injects malwareon ad network
Malicious ad embedded on legitimate websites
Vulnerable users exploited
© 2014 IBM Corporation10
A New Era of Smart
10
Spam continues to be a main channel for malware into companies
In March 2014, we saw the highest levels of spam measured during the last two and a half years.
© 2014 IBM Corporation11
A New Era of Smart
11
Significant increase in Java vulnerabilities
© 2014 IBM Corporation12
A New Era of Smart
12
Weponized content focused on end-user applications
© 2014 IBM Corporation13
A New Era of Smart
13
Attackers exploit application vulnerabilities to access sensitive data
Not testing puts the organization at risk.
Broken authentication can result in that the attacker looks like a legitimate user.
Bugs means increased risks for loss of critical information.
Mitigating potential damages makes cleanup a challenge.
of organizations underestimate the number of web applications they have deployed50%
Plan incident response for the unkown rather than the known.
Test and Remediate AppVulns
Protect Web Servers
Expect the Unexpected
© 2014 IBM Corporation14
A New Era of Smart
14
Attackers use exploit kits to deliver payload
Styx Exploit Kit
Rising in popularity
Successful in exploiting IE and Firefox on Windows
© 2014 IBM Corporation15
A New Era of Smart
15
The cybercrime ecosystem
Developer / Malware writer
Exploiter / Distributor•Spam•Phishing•Pharming•Social Engineering
Hosting / Outsourcing
Criminals just buy what they need…
•Weaponized content (Malware) •Delivery (spam, phishing, pharming…)•Hosting•SLA
Or just rent a hacker to get what they need…
•Industrial espionage•Bank fraud
© 2014 IBM Corporation16
A New Era of Smart
16
© 2014 IBM Corporation17
A New Era of Smart
www.ibm.com/security
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.