Security: Emerging Threats & Trends Danielle Alvarez, CISO.

Slides:



Advertisements
Similar presentations
1 © Copyright, Risk Masters, Inc All rights reserved.Draft for Discussion Purposes Only RMI Risk Masters, Inc. Emerging Trends in Cyber-Security.
Advertisements

1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
David Flournoy Bit9 Mid-Atlantic Regional Manager
1 Telstra in Confidence Managing Security for our Mobile Technology.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
CYBER CRIME AND SECURITY TRENDS
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Dell Connected Security Solutions Simplify & unify.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Association of Defense Communities June 23, 2015
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
Class 8 The State of Cybercrime Today- Threads & Solutions.
CSCE 522 Secure Software Development Best Practices.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Hurdles in implementation of cyber security in India.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Brandon Traffanstedt Systems Engineer - Southeast
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Why SIEM – Why Security Intelligence??
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Enterprise Network Security Threats that are Overlooked.
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
Surveillance and Security Systems Cyber Security Integration.
What, when and how – are you prepared?
Protect your Digital Enterprise
Cybersecurity as a Business Differentiator
Cybersecurity - What’s Next? June 2017
Liberty International Underwriters
Cyber Security: State of the Nation
Compliance with hardening standards
Detection and Analysis of Threats to the Energy Sector (DATES)
Trends in Ransomware Distribution
CYBER THREAT INTELLIGENCE
CSI Survey 2007 Tiffany Gorman
CMGT 230 Possible Is Everything/tutorialrank.com.
CMGT 230Competitive Success/snaptutorial.com
CMGT 230 Education for Service/tutorialrank
CMGT 230 Education for Service-- snaptutorial.com
CMGT 230 Education for Service-- tutorialrank.com
CMGT 230 Teaching Effectively-- snaptutorial.com.
Andy Hall – Cyber & Tech INSURANCE Specialist
On the Efficacy of Anomaly Detection in Process Control Networks
E-Commerce Security and Fraud Issues and Protections
Securing the Threats of Tomorrow, Today.
Brandon Traffanstedt Systems Engineer - Southeast
Security as Risk Management
Cyber Security Culture
Protecting Your Company’s Most Valuable Asset
The State of Cybersecurity in State Government NAST March 26, 2019
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
DATA BREACHES 6 4 , 9 3 There were…
Inside-Out Security: Building Castles not Warehouses Death Stars
In the attack index…what number is your Company?
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
IoT in Healthcare: Life or Death
Presentation transcript:

Security: Emerging Threats & Trends Danielle Alvarez, CISO

Threat Reality Approximately 5 malware events are generated every second 60% of attacks compromise organizations within minutes 75% of compromises spread externally within 24 hours Over 40% of compromises spread externally in less than 1 hour Detection is most costly internal activity, followed by recovery Detection & Recovery - 53% combined!

Threat Landscape The costs of cyber crime is rising ($11.5m in 2013, $12.7m in 2014), most costly: Malicious insiders Denial of service Web-based attacks Perimeter defense budget allocation historically highest Now adjusting to threat landscape Complex systems are harder to protect Security intelligence growing People Process Technology

Top Threat Risks Health & Safety Medical Records Services Rendered Breach Financial - FRAUD ACH Transfers Resource Consumption Recovery Efforts Service Delivery Health & Human Services Criminal Justice Government Private Critical Infrastructure

Emerging Threat Concerns Data Fidelity Going Dark IoT Malvertising Security Professional Shortage

Emerging Trends A strong security posture & governance practices moderate cyber crime costs Build it in, don’t bolt it on (SDLC) Self-Securing Software Software App Firewalls Purpose built code Code obfuscation (<10% in use) Be Intelligent Use intelligence Silver thread visibility Risk-based approach to mitigation Adaptive & Context-Aware IA&M People-centric Security Redefine Endpoint

Questions? Danielle Alvarez, CISA, MCP, MSA