SlideShare a Scribd company logo
1 of 11
Download to read offline
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
IT SECURITY:
2014 THREATS &
TRENDS
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
The 2014 Global State of Information Security
Survey® Key Findings, PWC, September 2013
KEY
FINDINGS
“DEFENDING YESTERDAY”
“While organisations have made significant security
improvements, they have not kept pace with
today’s determined adversaries.
As a result, many rely on yesterday’s security practices
to combat today’s threats.”
The 2014 Global State of Information Security Survey®
Key Findings, PwC, September 2013
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
THE BATTLE FOR PRIVACY
REACHED NEW HEIGHTS
Large databases still prime hacking targets
Governments toughened privacy laws
Countries spied on each other
Democracies spied on their own people
2013:
MAIN EVENTS
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2013: BIG ORGANISATIONS
BIG BREACHES
TWITTER 250,000 user accounts compromised
EVERNOTE 50 million users urged to reset passwords
LIVINGSOCIAL 50 million accounts compromised
FACEBOOK 6 million user accounts compromised
ADOBE 150 million user accounts compromised
Adobe breach affects millions of FACEBOOK users
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2013:
SPY vs SPY
Edward Snowden
reveals details of
the NSA’s
surveillance
program
NSA taps into
networks of
Google and
Yahoo's data
centres
Google, Yahoo, Microsoft and
Apple invest in 2048-bit
encryption to stop the NSA
from spying on them &
customers
NSA spys on private
cell phones of
European leaders
AFP admits
monitoring phones
of 4 MPs
City of London
announces removal of
smartphone-tracking,
WiFi-sniffing garbage
bins
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2013:
MAJOR TRENDS
PERSONALLY IDENTIFIABLE INFORMATION
(PII) REMAINED THE BIGGEST TARGET
TARGETED STEALTH ATTACKS
BECAME COMMONPLACE (VARIANTS OF APTS)
‘WHALING’ EVOLVED - TARGETING USERS WITH
HIGH LEVEL ACCESS PRIVILEGES
CYBER WARS BETWEEN NATION STATES CONTINUED
THE BYOD TREND PROVED UNSTOPPABLE
CLOUD COMPUTING BECAME MORE UBIQUITOUS
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2014:
MAJOR TRENDS
1.Compliance takes a backseat to Critical Business Risk
“Security should move beyond compliance
and be aligned with the business
—and championed by the CEO and board—
to emphasize threat awareness,
asset protection, and motives of opponents”
PwC 2014 Information Security Survey
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2014:
MAJOR TRENDS
2.Critical National Infrastructure moves to the front
“The UK will recruit experts in their hundreds ...
who will be part of the Joint Cyber Reserve
...to work alongside members of the
Ministry of Defence and GCHQ to protect
critical infrastructure and prevent data theft.”
C/NET UK
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2014:
SPECIFIC THREATS
Attacks will be more targeted, on:
Data in the cloud
‘Keepers of the keys’
Partner networks
File sharing services
WINDOWS XP's retirement
Unpatched MSXML, Java, and Adobe apps
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
2014:
HOW TO PREPARE
I. Assume the enemy is within
II. Check your logs for footprints
III. Make your IT staff more effective with better tools
IV. Review your security controls & policies
V. Ensure compliance with revised standards
VI. Get real-time intelligence e.g. Behaviour Anomaly Detection
VII. Improve security awareness across your organisation
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.
Resources
IT Security 2014 Threats & Trends – fully-referenced Hot Shot
Privacy Protection - Is It Too Late?– Short White paper
How to Combat Insider Risk with Huntsman – Application Brief
How to Secure the Cloud with Huntsman– Application Brief
Follow us
Contact us
FOR
MORE

More Related Content

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Tier-3 Huntsman - IT Security Threats & Trends

  • 1. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. IT SECURITY: 2014 THREATS & TRENDS
  • 2. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. The 2014 Global State of Information Security Survey® Key Findings, PWC, September 2013 KEY FINDINGS “DEFENDING YESTERDAY” “While organisations have made significant security improvements, they have not kept pace with today’s determined adversaries. As a result, many rely on yesterday’s security practices to combat today’s threats.” The 2014 Global State of Information Security Survey® Key Findings, PwC, September 2013
  • 3. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. THE BATTLE FOR PRIVACY REACHED NEW HEIGHTS Large databases still prime hacking targets Governments toughened privacy laws Countries spied on each other Democracies spied on their own people 2013: MAIN EVENTS
  • 4. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2013: BIG ORGANISATIONS BIG BREACHES TWITTER 250,000 user accounts compromised EVERNOTE 50 million users urged to reset passwords LIVINGSOCIAL 50 million accounts compromised FACEBOOK 6 million user accounts compromised ADOBE 150 million user accounts compromised Adobe breach affects millions of FACEBOOK users
  • 5. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2013: SPY vs SPY Edward Snowden reveals details of the NSA’s surveillance program NSA taps into networks of Google and Yahoo's data centres Google, Yahoo, Microsoft and Apple invest in 2048-bit encryption to stop the NSA from spying on them & customers NSA spys on private cell phones of European leaders AFP admits monitoring phones of 4 MPs City of London announces removal of smartphone-tracking, WiFi-sniffing garbage bins
  • 6. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2013: MAJOR TRENDS PERSONALLY IDENTIFIABLE INFORMATION (PII) REMAINED THE BIGGEST TARGET TARGETED STEALTH ATTACKS BECAME COMMONPLACE (VARIANTS OF APTS) ‘WHALING’ EVOLVED - TARGETING USERS WITH HIGH LEVEL ACCESS PRIVILEGES CYBER WARS BETWEEN NATION STATES CONTINUED THE BYOD TREND PROVED UNSTOPPABLE CLOUD COMPUTING BECAME MORE UBIQUITOUS
  • 7. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2014: MAJOR TRENDS 1.Compliance takes a backseat to Critical Business Risk “Security should move beyond compliance and be aligned with the business —and championed by the CEO and board— to emphasize threat awareness, asset protection, and motives of opponents” PwC 2014 Information Security Survey
  • 8. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2014: MAJOR TRENDS 2.Critical National Infrastructure moves to the front “The UK will recruit experts in their hundreds ... who will be part of the Joint Cyber Reserve ...to work alongside members of the Ministry of Defence and GCHQ to protect critical infrastructure and prevent data theft.” C/NET UK
  • 9. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2014: SPECIFIC THREATS Attacks will be more targeted, on: Data in the cloud ‘Keepers of the keys’ Partner networks File sharing services WINDOWS XP's retirement Unpatched MSXML, Java, and Adobe apps
  • 10. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. 2014: HOW TO PREPARE I. Assume the enemy is within II. Check your logs for footprints III. Make your IT staff more effective with better tools IV. Review your security controls & policies V. Ensure compliance with revised standards VI. Get real-time intelligence e.g. Behaviour Anomaly Detection VII. Improve security awareness across your organisation
  • 11. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. Resources IT Security 2014 Threats & Trends – fully-referenced Hot Shot Privacy Protection - Is It Too Late?– Short White paper How to Combat Insider Risk with Huntsman – Application Brief How to Secure the Cloud with Huntsman– Application Brief Follow us Contact us FOR MORE