March 21, 2012 John Vigouroux CEO M86 Security (acquired by Trustwave)

Slides:



Advertisements
Similar presentations
1 Matakuliah: F0142/Akuntansi Internasional Tahun: September 2006 Session 05 Reporting and Disclosure.
Advertisements

Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 1 Top 5 Modern Malware Trends Data Connectors – September 12, 2013 Frank Salvatore,
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Security for Today’s Threat Landscape Kat Pelak 1.
Security on Web 2.0 Krasznay Csaba. Google Search Trends.
Social media threats. Warning! May contain mild peril.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
1 Cybersecurity and web-based attacks A perspective from Symantec Zoltan Precsenyi Government Affairs Manager International Conference on Terrorism and.
Hewitt.com Redesign Security Considerations Jorgen Hesselberg, MITP’07 Brute Force.
1 Security & TWU Robert Placido Associate Provost for Technology and CIO Contents used with permission from FireEye.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Copyright NIKSUN 2014 Using Big Data Analytics To Thwart Cyber Threats Shivank Dua.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
ECMM 6010, Fall 2005 Intro 1 Technology issues in Electronic Commerce 1.Basic Networking: How does the internet work 2.Web programming: JavaScript, PHP,
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Study Results Advanced Persistent Threat Awareness.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Cyber Security Nevada Businesses Overview June, 2014.
Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Homework for Wed’s topic: Threats to E-Commerce 1. Review Chapter 5 in Laudon textbook 2. “Facebook's Top Cop”— Joe Sullivan and a staff of 50 people Fortune.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Catherine Lian Managing Director, Dell Indonesia
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
INTRODUCTION & QUESTIONS.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Law Firm Data Security: What In-house Counsel Need to Know
Identifying and Preparing for Emerging Industry Risks
Cyber Issues for Design Professionals
Cyber Security Zafar Sadik
Executive Director and Endowed Chair

بهترین راهکار را انتخاب کنید...
Partnering to Minimize the Impact of Data Compromises
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Security in New Jersey State Government
Internet Security Threat Status
Curating an Effective Security Culture
Keeping your data, money & reputation safe
Teaching you NOT to fall for Phish
Best Social Media Marketing Company
Forensic and Investigative Accounting
Introduction to Symantec Security Service
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

March 21, 2012 John Vigouroux CEO M86 Security (acquired by Trustwave)

2 Cybercrime: The Growing Threat Sources: Detica report, 2011; OECD, IDC, 2004, 2010, FBI/IC3 cybercrime statistics, 2011, FBI Annual Cost of Cybercrime $17B $21B >$100B >$200B Billions $350 $300 $250 $200 $150 $100 $50 $0 Targeted Attacks Accelerating Growth Daily occurrences of targeted attacks grows 400% during 2011 Symantec Intelligence Report >$330B Security Market $11B$22B$33B$37B$43B

News 3 New Proposed EU data protection rules will allow for fines of up to 2% of annual worldwide revenue… Just the companies shown on this slide would have paid $8.8B in fines

Most complete coverage for Cybercrime in the industry “We are less concerned with detecting mass attacks. It is vital that we address the emerging targeted attacks at our organization; these have the ability to do a significant amount of damage in terms of lost data, punitive damage and reputation loss.” -Fortune 500 Financial Services Company Mass Attacks Spam Bot Infections Social Media Scams Fake-AV Personal Data Loss Client-side Zero-day Malware Spear Phishing Social Media Blended Attacks APT’s Website Defacement Web Application Hacking Server-side Cybercrime Targeted Attacks

Two biggest debates about the Internet: Privacy Security

How to treat - Cybercrime 2007 – Big Problem 2010 – Very Big Problem 2011 – Calamity 2012 – PANDEMIC!