The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.

Slides:



Advertisements
Similar presentations
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Advertisements

Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
E-Commerce Security and Fraud Issues and Protections
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Real world cloud computing challenges Giedrius Markevičius Territory account manager.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Computer & Network Security
Paul King Director, Threat Intelligence CiscoSystems.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Cyber Security Nevada Businesses Overview June, 2014.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
The Changing World of Endpoint Protection
What does the future hold? Threat Horizon 2011 Adrian Davis 2009 Workshop on Cyber Security and Global Affairs August 2009.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader.
Hurdles in implementation of cyber security in India.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.
Security Mindset Lesson Introduction Why is cyber security important?
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Regional Cyber Crime Unit
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
TWOJA CYFROWA PRZYSZŁOŚĆ. JUŻ DZISIAJ. Dr Giles Nelson Senior Vice President, Software AG © 2016 Software AG. All rights reserved. For internal use only.
Team Electronics Automation & Machinery S-17, DLF Ind. Area, Phase-1, Sec-32, Faridabad ,
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security – Current Challenges
Journey to Microsoft Secure Cloud
Cyber Security: State of the Nation
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Understanding the First Line of Defense in Cyber Security
Dissecting the Cyber Security Threat Landscape
Securing Information Systems
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
Get instant internet security | | Wire IT Solutions
Risk of the Internet At Home
Strong Security for Your Weak Link:
E-Commerce Security and Fraud Issues and Protections
Security Essentials for Small Businesses
Securing the Threats of Tomorrow, Today.
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
Innovation at the Edge How rapid experimentation with emerging technologies is achieving results on Earth and in Space Tom Soderstrom, JPL IT Chief Technology.
I UNDERSTAND CONCEPTS OF CYBERSECURITY
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
LO1 - Know about aspects of cyber security
Global megatrends (relevant for our business)
Security Trends and Threats Affecting Innovations in Technology
IoT in Healthcare: Life or Death
Presentation transcript:

The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC

THE UNEXPECTED WE’VE GOT NEXT-GEN THREAT DEFENCE!

THREAT ACTORS Organised Cybercrime Industrial Espionage Activists / Terrorists State Sponsored

TECHNOLOGY DISRUPTION How digital disruption will impact cyber security | #CLOUDSEC

WHAT’S ONE THING IN COMMON HERE? DISRUPTED!

EXPECT TECHNOLOGY DISRUPTION “Digital disruption, when properly understood, should terrify you.” James McQuivey Author of “Digital Disruption: Unleashing the Next Wave of Innovation”

DISRUPTION #1: CLOUD COMPUTING Cloud computing has disrupted every industry it has touched. Enable more disruptive technologies to come. Hackers will find and attack weaknesses in the building blocks and joints of cloud computing.

DISRUPTION #2: MOBILE “Every once in a while a revolutionary product comes along that changes everything.” - Steve Jobs, 2007 Empowering Wearable Technologies, Location Sensing and Internet of Things (IoT) today. Cybercriminals can strike their targets from anywhere. More entry points for them to infiltrate an unsecured system or network.

DISRUPTION #3: BIG DATA Organisations will use Big Data to satisfy their customers better. Hackers will also use Big Data to exploit their victims better.

DISRUPTION #4: SOCIAL MEDIA Social media helps reach people easier and quicker. Cybercriminals want to reach you similarly too.

DISRUPTION #5: INTERNET OF THINGS Anything and everything that connects with the Internet can be hacked. IoT could be the “Network of all networks” in the future. 25 billion connected things by 2020 – Gartner Immature and experimental now.

UP AND COMING …

THE FUTURE OF CYBER THREATS What’s over the horizon? | #CLOUDSEC

THE FUTURE OF CYBER THREATS Disruptive technologies will produce large, complex and intelligent hyper-connected networks. Cybercriminals will follow technology disruption closely to develop and launch attacks in unexpected ways.

THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoS Attacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor Authentication Cyber-enabled Violence Malware for Humans Cyber Gang Wars High Impact, Targeted Identity Theft and Avatar Hijack Sophisticated Reputation Manipulation Misuse of Augmented Reality Abuse of Unmanned Vehicles and Smart Machines Hacks against Internet of Things with Direct Physical Impact Source: Project 2020 by ICSPA, Europol and Trend Micro

HOW CYBER SECURITY CAN PREVAIL Strategies for survival | #CLOUDSEC

BASICINTERMEDIATEADVANCED Endpoint Security Network Segmentation Firewall & IPS Web Security Application Security Two-Factor Authentication Mobile Security Data Security Advanced Threat Detection Security Intelligence Network Forensics Connected Threat Defence SECURITY OPERATIONS Access Management  Change Management  Vulnerability Management  Incident Response DEFENDING AGAINST THE UNEXPECTED

AssessEducateIdentify gapsKPIs Continuous Improvement Report Action Plan for Cybersecurity Leaders

THEN YOU CAN BE LIKE HIM ….. FEARLESS

Rik Ferguson \vice President, Security Research Trend #CLOUDSEC