Panel: Engineering Discipline in Cyber Security Steve Orrin, Chief Technologist, Intel Federal, Intel Coporation.

Slides:



Advertisements
Similar presentations
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Advertisements

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Slide title 70 pt CAPITALS Slide subtitle minimum 30 pt Top Ten Security Challenges for the Networked Society Mats Näslund Ericsson Research.
Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.
Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
IT GOVERNANCE COMMITTEE MEETING February 19, 2008.
Prepare for the future  The de-perimeterised “road-warrior”  Paul Simmonds ICI Plc. & Jericho Forum Board.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Top of Content Box Line Subtitle Line Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer.
Dell Connected Security Solutions Simplify & unify.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
The Changing World of Endpoint Protection
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Awicaksi E-Commerce Security & Payment System E-Commerce.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
2015 Security Conference Dave Gill Intel Security.
2015 Security Conference Ash Patel Intel Security.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Brandon Traffanstedt Systems Engineer - Southeast
User and Device Management
CYBER SECURITY PRACTICES: AN EXPERT PANEL DISCUSSION February 12, 2015 Harvard Business School Association of Boston.
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
How to Make Cyber Threat Intelligence Actionable
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
SafeNet The Foundation of Information Security Zen and the Art of Data Protection Preparing for the Evolution Adel Hajrasuliha – Regional Account Manager.
Spike DDoS Toolkit A Multiplatform Botnet Threat.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
2017 Security Predictions from FortiGuard Labs
Stopping Attacks Before They Stop Business
Chapter 1: Exploring the Network
Cybersecurity - What’s Next? June 2017
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Journey to Microsoft Secure Cloud
Real-time protection for web sites and web apps against ATTACKS
Challenges facing Enterprise Mobility
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Authentication 2.0: User Generated Security
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Acer Technical Support Number
Acer Support New Zealand Number
Prevent Costly Data Leaks from Microsoft Office 365
Add your services to Microsoft 365 Business
5G Security Training
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Information Protection
Information Protection
IoT in Healthcare: Life or Death
Presentation transcript:

Panel: Engineering Discipline in Cyber Security Steve Orrin, Chief Technologist, Intel Federal, Intel Coporation

Intel Corporation 2 Harbor Freight POS Attack Home Depot POS Attacked Sands Hacked Neiman Marcus Hacked Target breached via HVAC systems Spike Botnet launches DDOS via IoT Devices 2014: The Year of the Data Breach Sony Hacked Trends to watch for in 2015: Data Breaches continue (like Home Depot, Target, and Anthem) Full scale attacks on organizations (like Sony and Sands) Increased focus on Asymmetric attacks, advancements in APT’s including firmware/BIOS targeting Anthem’s Records Stolen

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Intel Corporation SERVERS PC LAPTOP DATABASE USB SMART PHONE ROUTING/ SWITCHING CLOUD VIRTUAL ENVIRONMENT SAN VOIP TABLET EMBEDDED DEVICES WIRELESS APPS 1 BILLION DEVICES in 2000’s 15 BILLION CONNECTED DEVICES in 2015 Security Challenges: 469,000 unique malware samples discovered weekly 83% organizations hit by Advanced Persistent Threats Flat to down IT/IS budgets Flat number of trained practitioners 100 BILLION CONNECTED DEVICES by 2020 DECREASED/FLAT BUDGETS LIMITED OR UNTRAINED RESOURCES UNPLANNEDCOMPLIANCE AND REPORTING REQUIREMENTS CHANGINGBUSINESSDEMANDS A Nasty Math Problem.

Intel Corporation 4 The Path Forward: End-to-End Security Device Security Physical Device Security Endpoint Protection Application/Functional separation Secure the Data Confidentiality & Integrity At rest, in transit, and in use Context Aware Security Authentication and Access Control for the user, the device and its data Security Monitoring & Management Security Policy Management Security Event Monitoring Connected Security & Actionable Threat Intelligence