Security for Today’s Threat Landscape Kat Pelak 1.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
7 Effective Habits when using the Internet Philip O’Kane 1.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Symantec Security Intelligence Internet Security Threat Report Volume XVI June, 2011 Tiffany Jones Director – Programs and Strategy Symantec Public.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Internet safety By Lydia Snowden.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
BUSINESS B1 Information Security.
Adversary Defense: Past, Present, Future Presenter’s Name Here Presenter’s Title Here.
Dell Connected Security Solutions Simplify & unify.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
Small Business Security Keith Slagle April 24, 2007.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
The “Five W’s” of Mobile Device Malware: W ho, W hat, W hen, W here, and W hy? … and What Can be Done About It? Kevin McPeak, CISSP, ITILv3 Technical Architect,
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
What’s new in SEP Presenter’s Name Here Presenter’s Title Here.
Computer Security By Duncan Hall.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Safe’n’Sec IT security solutions for enterprises of any size.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Computer Security Keeping you and your computer safe in the digital world.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Activate your McAfee on Support for McAfee
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Deployment Planning Services
Ilija Jovičić Sophos Consultant.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Journey to Microsoft Secure Cloud
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Office 365 with confidence: security features for Office 365
Jon Peppler, Menlo Security Channels
Prevent Costly Data Leaks from Microsoft Office 365
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Intercept X for Server Early Access Program Sophos Tester
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Protection
Business-class solution
Security in mobile technologies
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Information Protection
Presentation transcript:

Security for Today’s Threat Landscape Kat Pelak 1

Mega Breaches Healthcare, education and the public sectors accounted for 58% of all data breaches But the retail, computer software and financial sectors accounted for 77% of all the identities exposed in Healthcare, education and the public sectors accounted for 58% of all data breaches But the retail, computer software and financial sectors accounted for 77% of all the identities exposed in

Top Causes of Data Breaches 4 Sept to Aug 2014 Source: Symantec Hackers Accidentally Made Public Theft or Loss Insider Theft 53% 21% 20% 6% TOTAL Number of Incidents

Data Loss Increase ? ? 552M Total identities exposed in 2013, A 493% Increase M 552M

Breaches

Data by the Numbers

Ransomware 500% in the last 6 months.

Dragonfly: Western Energy Companies Under Sabotage Threat Ongoing cyberespionage campaign Targeting the energy sector in Europe and US. Other sectors not immune Stealing information Capable of sabotage Attacker capabilities –persistent access to networks –Information stealing –Sabotage Ongoing cyberespionage campaign Targeting the energy sector in Europe and US. Other sectors not immune Stealing information Capable of sabotage Attacker capabilities –persistent access to networks –Information stealing –Sabotage

10 A Russian crime organization has reportedly stolen over 1.2 billion Internet credentials. Over 4,000 websites appear to have been compromised Why is Security so LAX?

-borne threats are common 11 1 in 392 s are a phishing attack 1 in 196 s are a malware attack 66% of all is spam 25% Contain a hyperlink to malicious code

Mobile Users at Risk 50 % 38 % Source: 2013 Norton Report Don’t use basic precautions such as passwords, security software or back up files for their mobile device Of smartphone users have experienced mobile cybercrime in past 12 months

72 % 90 % 78 % 56 % 48 % 33 % DELETE SUSPICIOUS S FROM PEOPLE THEY DON’T KNOW HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE Mobile Security IQ Source: 2013 Norton Report

Social Media

Mobile Threats Android remains the platform of choice for malware authors Android Symbian Windows Number of Threats Percent of Threats 94% 2% 1 Platform iOS Mobile Threats: Malicious Code by Platform, 2013 Source: Symantec

Targeted Attacks

Protection Against Targeted Attacks Reputational & BehavioralProtection (SEP) Detect and block new and unknown threats based on global reputation and behavior of files Host-based IntrusionDetection and Prevention (DCS) Locks down key systems that contain confidential information Prevents any unauthorized code to run — independent of AV signatures Removable Media Device Control(SEP) Restrict removable devices and functions to prevent malware infection & Web Gateway Security Scan & block with potentially malicious URLs, attachments or content. Monitor inbound/outbound web traffic and block accordingly Encryption Discover data spills of confidential information that are targeted by attackers Detect and prevent exfiltration of confidential information that are targeted by attackers Endpoint & Network DataCorrelation (MSS-ATP) Create and enforce security policies so all confidential information is encrypted Network Threat and VulnerabilityMonitoring (MSS) Prioritize threat information detected at the network through security intelligence and information coming from endpoint security devices.

Zero-day Vulnerabilities

Avoiding Data Breaches 19 Data Classification (Insight) Determine what sensitive information exists in your organization Categorize it appropriately and protect it according to its classification level Data Loss Prevention (DLP) Detect and prevent exfiltration of sensitive information that is targeted by attackers Enforce rules prohibiting access of confidential data using applications Host-based IntrusionDetection and Prevention (DCS) Locks down key systems that contain confidential information Prevents any unauthorized code to run — independent of AV signatures & Web Gateway Security Scan & block with potentially malicious URLs, attachments or content. Monitor inbound/outbound web traffic and block accordingly Encryption Create and enforce security policy so all confidential information is encrypted Strong Authentication (VIP) Use two-factor authentication to protect against credential theft

Mitigating Mobile Attacks 20 Application ManagementSymantec App Center Secure data in corporate applications regardless of device ownership Device ManagementSymantec Mobile Management Remotely wipe devices in case of theft or loss, control password policies Update devices with applications as needed without physical access Device SecuritySymantec App Center Guard mobile device against malware Prevent the device from becoming a vulnerability Identity & Access ControlSymantec VIP Provide strong authentication and authorization for access to enterprise applications and resources Ensure safe access to enterprise resources from right devices with right postures

Defense-in-Depth Security Information Management Secure Mail Gateway Client and Asset Management Encryption Endpoint Protection

3 things you should do when you leave this room.. Review your current security stack Presentation Identifier Goes Here Consider your options to fill the gaps If you need help, contact Symantec

23 Download: symantec.com/threatreport Stay Informed

Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.