Presentation is loading. Please wait.

Presentation is loading. Please wait.

ISACA Many thanks to the ISACA Belgium Chapter, who created the original slide deck.

Similar presentations


Presentation on theme: "ISACA Many thanks to the ISACA Belgium Chapter, who created the original slide deck."— Presentation transcript:

1 ISACA Many thanks to the ISACA Belgium Chapter, who created the original slide deck.

2 © 2013 ISACA. All rights reserved Contact: admin@isaca-london.orgadmin@isaca-london.org www.isaca.org

3 ISACA Facts >100,000 members worldwide, in more than 180 countries >2,900 members in London.

4

5 www.isaca-london.org ISACA Certifications Be recognised in your profession

6 OFFICIAL REVISION WORKSHOP London 13-14 May 2013 www.isaca-london.org ISACA Certifications Be recognised in your profession

7 OFFICIAL REVISION WORKSHOP London 1-3 May 2013!!! www.isaca-london.org

8 ISACA Certifications Be recognised in your profession

9 © 2013 ISACA. All rights reserved Contact: admin@isaca-london.orgadmin@isaca-london.org www: isaca.org

10

11

12

13

14

15 © 2013 ISACA. All rights reserved Contact: admin@isaca-london.orgadmin@isaca-london.org www: isaca.org

16

17

18

19

20 Monthly seminars on industry related issues – free to members, £20 to non-members. A saving of over £200 a year for members.

21 ISACA membership Be aware of current, industry issues

22

23 © 2013 ISACA. All rights reserved Contact: admin@isaca-london.orgadmin@isaca-london.org www: isaca.org

24 Study Results Advanced Persistent Threat Awareness

25 The 2010 Google Aurora attack forever changed the way we look at Internet security. This large-scale, sophisticated attack showed us that all sectors, from private to public, are vulnerable to a new class of security breach: The Advanced Persistent Threat © 2013 ISACA. All rights reserved

26 in its adaptability, APTs were once thought to be limited to attacks on government networks. APTs exploit zero-day threats – unknown weakness. APTs also often take the form of well-designed spear phishing attacks. © 2013 ISACA. All rights reserved ADVANCED, STEALTHY AND CHAMELEON-LIKE

27 The 2011 RSA SecurID attack was attributed to an APT. So was the Internet worm “Flame.” Following the Google attacks* similar targeted intrusions quickly followed, garnering media scrutiny – and growing concern that the APT was more damaging than it seemed. *Google attacks affected nearly three dozen well-known tech, finance and defense enterprises © 2013 ISACA. All rights reserved

28 How well do security professionals understand APTs? How are they affecting different industries and organizations throughout the world? What is being done to prevent them? In Q4 of 2012, ISACA launched the APT Awareness Survey to find out. © 2013 ISACA. All rights reserved

29 So ISACA asked 1,500 people worldwide – from tech service consultants, to people in the banking industry – about APTs. 19 % Asia 32 % 8%8% 3%3% 38 % Europe / Africa North America Latin America Oceania © 2013 ISACA. All rights reserved

30 42.5% of respondents were familiar… 28.6%, somewhat familiar… And only 25.1% very familiar about APTs. Overall, 96.2% were somewhat familiar with APTs… But most importantly: AWARENESS of respondents understood APTs as a very credible, serious threat to national security and economic stability. 93.6% 25 % 42 % 29 % 4%4% Very Familiar Familiar Somewhat Familiar Not at All Familiar © 2013 ISACA. All rights reserved

31 Just 46.6% of respondents believed that APTs were a unique threat. And more than half (53.4%) believe this advanced set of threats is no different to what they’ve been dealing with in the past. WHAT DOES THIS MEAN? 53 % Similar 47 % Unique © 2013 ISACA. All rights reserved

32 There’s a huge disconnect in the IT industry about APTs … A lack of understanding and education. © 2013 ISACA. All rights reserved

33 Highest Risks on Enterprises from APTs Other key highlights 89.7% of respondents believe the use of social networking sites like Facebook or Twitter increases the likelihood of a successful APT attack. BELIEVE THAT 87.3% JAILBREAKS, ROOTING & BYOD GREATLY INCREASE THE CHANCES OF AN APT OCCURRING. © 2013 ISACA. All rights reserved

34 Although just 21.6% of respondents reported having been victims of an APT attack 63% – three times that amount – believe it’s only a matter of time before their business is targeted. Suffering with an APT 63% BELIEVE IT’S ONLY A MATTER OF TIME BEFORE THEIR BUSINESS IS TARGETED. © 2013 ISACA. All rights reserved

35 The majority of survey takers – up to 60% – believed that they have the ability to ID, respond to and stop a successful APT attack. 31.1% said they have incident management plans in place to fight an APT. 49.5% are prepared, but without a concrete solution. Detect APT Attacks Respond to APT Attacks Stop a Successful Attack 0%20%40%60% How able is your enterprise to deal with an APT attack? Very Able Able Not Able Not at All Able © 2013 ISACA. All rights reserved

36 How are people handling the threats? Most respondents are using technology in a risk based layered approach to prevent and combat APTs. 94.9% Anti-Virus / Anti-Malware 92.8% Network Tech (Firewalls, etc.) 71.2% IPS © 2013 ISACA. All rights reserved

37 There aren’t enough precautions being taken against the threat of an APT. Up to 81.8% of survey takers have not updated their agreements with vendors who provide protection against APT. And 67.3% reported that they haven’t held any APT awareness training programs for their employees. A Troubling Lack of Initiative Has your enterprise increased security training as a result of APTs? Very Likely Likely Not Very likely Not at All Likely 0%20%40%60%80% © 2013 ISACA. All rights reserved Yes No

38 APTs are serious threats. We need more consideration to their consequences. Enterprises must adopt more technology awareness training, vendor management, incident management and increased attention from executives. © 2013 ISACA. All rights reserved

39 Advanced Persistent Threats differ from the traditional, average virus, and need to be classified as such. Many enterprises and companies have made some positive inroads into fighting APTs, like better security management. But there’s still a lack of cohesion and understanding to what APTs are and how to defend against them. Market conditions have not sufficiently changed, and the technology to fight APTs isn’t fully evolved yet. Conclusion But there’s still a lack of cohesion and understanding to what APTs are and how to defend against them. © 2013 ISACA. All rights reserved

40 ISACA is here to provide its members guidance in identifying and eradicating security breaches A series of educational products to address challenges in cyber security, and guard against APTs, is currently in development. Take Action Against APTs To learn more visit us at WWW.ISACA.ORG/CYBERSECURITY

41 © 2013 ISACA. All rights reserved Contact: admin@isaca-london.orgadmin@isaca-london.org www: isaca.org

42 NEXT “CAN’T MISS” EVENT – INSIGHTS 2013 10 – 12 June 2013, Berlin, Germany InfoSec attendees receive a 40% discount

43 INSIGHTS 2013 Puts you in smart company with unprecedented access to CEOs, CIOs and other business leaders from around the world. Get inspired and see how organizations are integrating IT into business strategies to drive innovation and results. Gain vital information through spotlights and networking sessions with industry leaders.

44 Questions Contact ISACA's Education/Conference Department: Tel: +1.847.660.5585 Fax: +1.847.253.1443 conference@isaca.org conference@isaca.org Media Inquiries Contact the ISACA Communications Department: Tel: +1.847.660.5512 or +1.847.660.5564 news@isaca.org news@isaca.org INSIGHTS 2013

45 © 2013 ISACA. All rights reserved Contact: admin@isaca-london.orgadmin@isaca-london.org www: isaca.org


Download ppt "ISACA Many thanks to the ISACA Belgium Chapter, who created the original slide deck."

Similar presentations


Ads by Google