top trends driving it security in 2014 daniel ayoub, cissp, cism, cisa product manager, ips dell |...
TRANSCRIPT
![Page 1: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/1.jpg)
Top trends driving IT security in 2014
Daniel Ayoub, CISSP, CISM, CISAProduct Manager, IPSDell | Network Security
2014
![Page 2: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/2.jpg)
2 SonicWALLConfidential
Top 10 Security Trends: 2014
![Page 3: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/3.jpg)
3 SonicWALLConfidential
Protect Yourself
http://www.darkreading.com/management/socially-engineered-behavior-to-blame-fo/240165591http://www.bbc.co.uk/news/uk-scotland-25898134
![Page 4: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/4.jpg)
4 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. 8. 7. 6. 5. 4. 3. 2. 1.
![Page 5: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/5.jpg)
5 SonicWALLConfidential
Increased Usage of SSL Encryption
http://www.networkcomputing.com/next-generation-data-center/news/networking/nsa-surveillance-revives-calls-for-an-al/240165556http://www.thewhir.com/web-hosting-news/ssl-use-among-million-busiest-sites-48-year-year-netcraft-survey
![Page 6: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/6.jpg)
6 SonicWALLConfidential
Increased Usage of SSL Encryption
http://www.webpronews.com/yahoo-search-is-now-encrypted-by-default-2014-01http://www.zdnet.com/twitter-enforces-ssl-encryption-for-apps-connecting-to-its-api-7000025138/http://searchenginewatch.com/article/2309689/As-Microsoft-Moves-to-Encrypted-Search-Webmasters-Could-Lose-More-Keyword-Datahttp://online.wsj.com/news/articles/SB10001424052702303448204579339432277705894
![Page 7: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/7.jpg)
7 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. 7. 6. 5. 4. 3. 2. 1.
![Page 8: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/8.jpg)
8 SonicWALLConfidential
http://www.legitreviews.com/cryptolocker-ransomware-affected-estimated-250000-computers_131647http://www.tomsguide.com/us/cryptolocker-evolves-worm,news-18066.html
![Page 9: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/9.jpg)
9 SonicWALLConfidential
http://arstechnica.com/security/2014/01/researchers-warn-of-new-meaner-ransomware-with-unbreakable-crypto/http://www.therecord.com/news-story/4334442-ransomware-attacks-are-increasing/
![Page 10: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/10.jpg)
10 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks7. 6. 5. 4. 3. 2. 1.
![Page 11: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/11.jpg)
11 SonicWALLConfidential
Increase in Win7 & Win8 Attacks
http://www.independent.ie/business/technology/deadline-looms-for-xp-users-as-microsoft-shuts-system-support-29941733.htmlhttp://www.zdnet.com/at-years-end-xp-usage-plunges-as-windows-7-and-8-take-over-7000024699/
![Page 12: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/12.jpg)
12 SonicWALLConfidential
Increase in Win7 & Win8 Attacks
http://www.independent.ie/business/technology/deadline-looms-for-xp-users-as-microsoft-shuts-system-support-29941733.htmlhttp://www.zdnet.com/at-years-end-xp-usage-plunges-as-windows-7-and-8-take-over-7000024699/
![Page 13: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/13.jpg)
13 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks7. Gov’t Healthcare Spam / Phishing6. 5. 4. 3. 2. 1.
![Page 14: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/14.jpg)
14 SonicWALLConfidential
Government Healthcare Spam & Phishing
http://securityskeptic.typepad.com/the-security-skeptic/2013/10/is-it-spam-this-week-in-healthcare-fraud-email.htmlhttp://www.usatoday.com/story/news/nation/2013/11/11/affordable-care-act-scams/3501595/
![Page 15: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/15.jpg)
15 SonicWALLConfidential
Government Healthcare Spam & Phishing
http://www.consumer.ftc.gov/articles/0394-suspect-health-care-scamhttps://www.coloradoattorneygeneral.gov/sites/default/files/uploads/press_office/Smart%20Tips%20-%20Healthcare%20Scams%208_5%20x%2011%20May%202013.pdf
![Page 16: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/16.jpg)
16 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks7. Gov’t Healthcare Spam / Phishing6. New Exploit Kits in the Wild5. 4. 3. 2. 1.
![Page 17: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/17.jpg)
17 SonicWALLConfidential
New Exploit Kits in the Wild
http://threatpost.com/blackhole-and-cool-exploit-kits-nearly-extinct/103034http://news.softpedia.com/news/BlackHole-Exploit-Kit-Author-Reportedly-Arrested-in-Russia-388949.shtml
![Page 18: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/18.jpg)
18 SonicWALLConfidential
New Exploit Kits in the Wild
http://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.htmlhttp://www.scmagazineuk.com/exploit-kits-for-sale-on-a-website-near-you/article/301851/
![Page 19: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/19.jpg)
19 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks7. Gov’t Healthcare Spam / Phishing6. New Exploit Kits in the Wild5. Bitcoin Stealing Malware Reboot4. 3. 2. 1.
![Page 20: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/20.jpg)
20 SonicWALLConfidential
Bitcoin Stealing Malware Reboot
http://www.technewsworld.com/story/79836.htmlhttp://www.net-security.org/malware_news.php?id=2671
![Page 21: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/21.jpg)
21 SonicWALLConfidential
Bitcoin Stealing Malware Reboot
http://www.coindesk.com/yahoo-infects-2-million-european-pcs-bitcoin-malware/http://www.theguardian.com/technology/2014/jan/08/yahoo-malware-turned-europeans-computers-into-bitcoin-slaves
![Page 22: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/22.jpg)
22 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks7. Gov’t Healthcare Spam / Phishing6. New Exploit Kits in the Wild5. Bitcoin Stealing Malware Reboot4. Watering-hole Attacks on the Rise3. 2. 1.
![Page 23: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/23.jpg)
23 SonicWALLConfidential
Watering-Hole Attacks on the Rise
http://www.scmagazine.com/watering-hole-attacks-are-becoming-increasingly-popular-says-study/article/313800/http://searchsecurity.techtarget.com/news/2240213164/Spear-phishing-still-popular-but-more-watering-hole-attacks-coming
![Page 24: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/24.jpg)
24 SonicWALLConfidential
Watering-Hole Attacks on the Rise
http://www.welivesecurity.com/2013/05/07/watering-hole-attack-on-dept-of-labor-site-exploited-new-ie8-vulnerability/https://threatpost.com/ie-zero-day-watering-hole-attack-injects-malicious-payload-into-memory/102891
![Page 25: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/25.jpg)
25 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks7. Gov’t Healthcare Spam / Phishing6. New Exploit Kits in the Wild5. Bitcoin Stealing Malware Reboot4. Watering-hole Attacks on the Rise3. More Credit/Debit Card Data-Breaches2. 1.
![Page 26: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/26.jpg)
26 SonicWALLConfidential
More Credit/Debit Card Data-Breaches
http://www.nbcnews.com/business/fbi-retailers-expect-more-credit-card-breaches-2D11979850http://www.huffingtonpost.com/2014/01/17/six-other-stores-are-bein_n_4618414.html
![Page 27: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/27.jpg)
27 SonicWALLConfidential
More Credit/Debit Card Data-Breaches
http://www.theverge.com/2014/1/20/5326772/windows-xp-powers-95-percent-of-atms-worldwidehttp://www.miamiherald.com/2014/01/24/3891202/switch-from-card-swiping-to-chip.html
![Page 28: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/28.jpg)
28 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks7. Gov’t Healthcare Spam / Phishing6. New Exploit Kits in the Wild5. Bitcoin Stealing Malware Reboot4. Watering-hole Attacks on the Rise3. More Credit/Debit Card Data-Breaches2. Sophisticated Smartphone Attacks1.
![Page 29: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/29.jpg)
29 SonicWALLConfidential
Sophisticated Smartphone Attacks
![Page 30: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/30.jpg)
30 SonicWALLConfidential
Sophisticated Smartphone Attacks
Vulnerabilities Malware Families
http://gcn.com/articles/2013/04/19/iphone-vulnerabilities-android-most-attacked.aspx
![Page 31: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/31.jpg)
31 SonicWALLConfidential
Sophisticated Smartphone Attacks
http://thehackernews.com/2013/09/Android-Firefox-Zero-Day-Exploit-for-Sale.htmlhttp://www.techienews.co.uk/974908/android-vulnerability-allows-interception-vpn-data-researchers-claim/
![Page 32: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/32.jpg)
32 SonicWALLConfidential
Security Trends, 201410. Increased Usage of SSL Encryption
9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks7. Gov’t Healthcare Spam / Phishing6. New Exploit Kits in the Wild5. Bitcoin Stealing Malware on the Rise4. Watering-hole Attacks on the Rise3. More Credit/Debit Card Data-Breaches2. Sophisticated Smartphone Attacks1. System Hopping Malware
![Page 33: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/33.jpg)
33 SonicWALLConfidential
System Hopping Malware
http://www.computerworld.com/s/article/9229596/Windows_malware_hides_in_iOS_apphttp://consumerist.com/2013/02/04/great-now-theres-android-malware-that-can-infect-your-pc-turn-it-into-a-listening-device/
![Page 34: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/34.jpg)
34 SonicWALLConfidential
System Hopping Malware
http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/http://www.pcworld.com/article/2090940/new-windows-malware-tries-to-infect-android-devices-connected-to-pcs.html
![Page 37: Top trends driving IT security in 2014 Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security 2014](https://reader035.vdocuments.us/reader035/viewer/2022081603/56649e0c5503460f94af5132/html5/thumbnails/37.jpg)
37 SonicWALLConfidential
Thank You!
Daniel Ayoub, CISSP, CISM, CISA, CEHProduct Manager, IPSDell | SonicWALL
Follow me on Twitter: @DanielAyoub