tier-3 huntsman - it security threats & trends

11
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. IT SECURITY: 2014 THREATS & TRENDS

Post on 19-Oct-2014

180 views

Category:

Technology


2 download

DESCRIPTION

A look at the recent IT security trends and topics affecting the risk, compliance and cyber-security professional

TRANSCRIPT

Page 1: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

IT SECURITY:

2014 THREATS &

TRENDS

Page 2: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

The 2014 Global State of Information Security

Survey® Key Findings, PWC, September 2013

KEY FINDINGS

“DEFENDING YESTERDAY”

“While organisations have made significant security improvements, they have not kept pace with

today’s determined adversaries.

As a result, many rely on yesterday’s security practices to combat today’s threats.”

The 2014 Global State of Information Security Survey®

Key Findings, PwC, September 2013

Page 3: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

THE BATTLE FOR PRIVACY

REACHED NEW HEIGHTS

Large databases still prime hacking targets

Governments toughened privacy laws

Countries spied on each other

Democracies spied on their own people

2013: MAIN EVENTS

Page 4: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

2013: BIG ORGANISATIONS BIG BREACHES

TWITTER 250,000 user accounts compromised

EVERNOTE 50 million users urged to reset passwords

LIVINGSOCIAL 50 million accounts compromised

FACEBOOK 6 million user accounts compromised

ADOBE 150 million user accounts compromised

Adobe breach affects millions of FACEBOOK users

Page 5: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

2013: SPY vs SPY

Edward Snowden

reveals details of

the NSA’s

surveillance

program

NSA taps into

networks of

Google and

Yahoo's data

centres

Google, Yahoo, Microsoft and

Apple invest in 2048-bit

encryption to stop the NSA

from spying on them &

customers

NSA spys on private

cell phones of

European leaders

AFP admits

monitoring phones

of 4 MPs

City of London

announces removal of

smartphone-tracking,

WiFi-sniffing garbage

bins

Page 6: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

2013: MAJOR TRENDS

PERSONALLY IDENTIFIABLE INFORMATION

(PII) REMAINED THE BIGGEST TARGET

TARGETED STEALTH ATTACKS

BECAME COMMONPLACE (VARIANTS OF APTS)

‘WHALING’ EVOLVED - TARGETING USERS WITH HIGH LEVEL ACCESS PRIVILEGES

CYBER WARS BETWEEN NATION STATES CONTINUED

THE BYOD TREND PROVED UNSTOPPABLE

CLOUD COMPUTING BECAME MORE UBIQUITOUS

Page 7: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

2014: MAJOR TRENDS

1.Compliance takes a backseat to Critical Business Risk

“Security should move beyond compliance and be aligned with the business

—and championed by the CEO and board— to emphasize threat awareness,

asset protection, and motives of opponents”

PwC 2014 Information Security Survey

Page 8: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

2014: MAJOR TRENDS

2.Critical National Infrastructure moves to the front

“The UK will recruit experts in their hundreds ... who will be part of the Joint Cyber Reserve

...to work alongside members of the Ministry of Defence and GCHQ to protect

critical infrastructure and prevent data theft.”

C/NET UK

Page 9: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

2014: SPECIFIC THREATS

Attacks will be more targeted, on:

Data in the cloud

‘Keepers of the keys’

Partner networks

File sharing services

WINDOWS XP's retirement

Unpatched MSXML, Java, and Adobe apps

Page 10: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

2014:

HOW TO PREPARE

I. Assume the enemy is within

II. Check your logs for footprints

III. Make your IT staff more effective with better tools

IV. Review your security controls & policies

V. Ensure compliance with revised standards

VI. Get real-time intelligence e.g. Behaviour Anomaly Detection

VII. Improve security awareness across your organisation

Page 11: Tier-3 Huntsman - IT Security Threats & Trends

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

Resources IT Security 2014 Threats & Trends – fully-referenced Hot Shot Privacy Protection - Is It Too Late?– Short White paper How to Combat Insider Risk with Huntsman – Application Brief How to Secure the Cloud with Huntsman– Application Brief

Follow us

Contact us

FOR MORE