tier-3 huntsman - it security threats & trends
Post on 19-Oct-2014
180 views
DESCRIPTION
A look at the recent IT security trends and topics affecting the risk, compliance and cyber-security professionalTRANSCRIPT
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
IT SECURITY:
2014 THREATS &
TRENDS
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
The 2014 Global State of Information Security
Survey® Key Findings, PWC, September 2013
KEY FINDINGS
“DEFENDING YESTERDAY”
“While organisations have made significant security improvements, they have not kept pace with
today’s determined adversaries.
As a result, many rely on yesterday’s security practices to combat today’s threats.”
The 2014 Global State of Information Security Survey®
Key Findings, PwC, September 2013
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
THE BATTLE FOR PRIVACY
REACHED NEW HEIGHTS
Large databases still prime hacking targets
Governments toughened privacy laws
Countries spied on each other
Democracies spied on their own people
2013: MAIN EVENTS
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2013: BIG ORGANISATIONS BIG BREACHES
TWITTER 250,000 user accounts compromised
EVERNOTE 50 million users urged to reset passwords
LIVINGSOCIAL 50 million accounts compromised
FACEBOOK 6 million user accounts compromised
ADOBE 150 million user accounts compromised
Adobe breach affects millions of FACEBOOK users
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2013: SPY vs SPY
Edward Snowden
reveals details of
the NSA’s
surveillance
program
NSA taps into
networks of
Google and
Yahoo's data
centres
Google, Yahoo, Microsoft and
Apple invest in 2048-bit
encryption to stop the NSA
from spying on them &
customers
NSA spys on private
cell phones of
European leaders
AFP admits
monitoring phones
of 4 MPs
City of London
announces removal of
smartphone-tracking,
WiFi-sniffing garbage
bins
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2013: MAJOR TRENDS
PERSONALLY IDENTIFIABLE INFORMATION
(PII) REMAINED THE BIGGEST TARGET
TARGETED STEALTH ATTACKS
BECAME COMMONPLACE (VARIANTS OF APTS)
‘WHALING’ EVOLVED - TARGETING USERS WITH HIGH LEVEL ACCESS PRIVILEGES
CYBER WARS BETWEEN NATION STATES CONTINUED
THE BYOD TREND PROVED UNSTOPPABLE
CLOUD COMPUTING BECAME MORE UBIQUITOUS
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2014: MAJOR TRENDS
1.Compliance takes a backseat to Critical Business Risk
“Security should move beyond compliance and be aligned with the business
—and championed by the CEO and board— to emphasize threat awareness,
asset protection, and motives of opponents”
PwC 2014 Information Security Survey
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2014: MAJOR TRENDS
2.Critical National Infrastructure moves to the front
“The UK will recruit experts in their hundreds ... who will be part of the Joint Cyber Reserve
...to work alongside members of the Ministry of Defence and GCHQ to protect
critical infrastructure and prevent data theft.”
C/NET UK
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2014: SPECIFIC THREATS
Attacks will be more targeted, on:
Data in the cloud
‘Keepers of the keys’
Partner networks
File sharing services
WINDOWS XP's retirement
Unpatched MSXML, Java, and Adobe apps
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2014:
HOW TO PREPARE
I. Assume the enemy is within
II. Check your logs for footprints
III. Make your IT staff more effective with better tools
IV. Review your security controls & policies
V. Ensure compliance with revised standards
VI. Get real-time intelligence e.g. Behaviour Anomaly Detection
VII. Improve security awareness across your organisation
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Resources IT Security 2014 Threats & Trends – fully-referenced Hot Shot Privacy Protection - Is It Too Late?– Short White paper How to Combat Insider Risk with Huntsman – Application Brief How to Secure the Cloud with Huntsman– Application Brief
Follow us
Contact us
FOR MORE