Download presentation
Presentation is loading. Please wait.
Published byTiffany James Modified over 6 years ago
1
Navigating Security in the World of Emerging Technologies
By Assoc. Prof Dr. Omar Zakaria Vice President Information Security Professional of Malaysia (ISPA.my)
2
Agenda Introduction Establishing the Status Quo of The Region’s Security Progression The Dynamic Business Environment of Virtual and Mobility Emerging Technologies vs. New Threats Question & Answer
3
Introduction Emerging Technologies in many domains: Agriculture
Biomedical Displays Electronics Energy
4
InTRODUCTION (CONT..) IT and Communications
(4G, AI, Pervasive Computing, Cloud etc.) Manufacturing Materials Science Robotics Transport
5
Introduction (cont..) How these technologies affect security?
Ethical issue (i.e. act as Robin Hood?) Way to do things (i.e. physically vs. mobile/remote) New facilities offer new opportunities (i.e. location tracer)
6
Introduction (cont..) How these technologies affect security?
More ways to exploit vulnerabilities (i.e. built-in tools, GUI hackers’ tools) New threats (i.e. viruses on smartphone) More countermeasures (i.e. anti-viruses software on smartphone)
7
Introduction (cont..) It is a need to navigate security in these emerging technologies: Establishing status quo Sustaining in dynamic environment (virtual and mobility) Emerging technologies vs. threats landscape
8
Establishing status quo
Staff as security partner Obtaining ISO ISMS 27001:2005 Enforcement on privacy protection Perform penetration testing/ vulnerability test/PSA Treat information security as “all are responsible” rather than “they are responsible”
9
Establishing status quo (CONT..)
Practising multi-authentication Accountability aspects Registered users for gaining access to free WiFi Secure programming approach
10
ESTABLISHING STATUS QUO (Cont..)
Guidelines on networking scanning Data security agreement in cloud Trust level (i.e. trusted third parties)
11
Sustaining in Dynamic Environment
Issues that need to be considered: Consumerisation (i.e. disclosure of consumer’s location) BYOD authentication Mobile-phone anti-virus scanning Pervasive computing Virtual reality
12
Emerging Technologies vs. Threats Landscape
Smartphone/ Mobile threats Embedded hardware Virtual currency Advances in OS Blinking online traffic lights
13
Emerging Technologies vs. Threats Landscape (CONT..)
Rogue certificates Cyberwar showoffs Hactivism Legalised spam Industrial attacks (blackmail or extortion)
14
conclusion Provide alternative ways to do things
Enforce new countermeasure on new threat Emerging technologies also change threat landscape Security is a hardening process and not 100% a secure process
15
Q & A Session Thank you Any queries can send to Interested in ISPA? Visit this URL: UPNM? Visit this URL:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.