SlideShare uma empresa Scribd logo
1 de 17
Top Security Trends and Takeaways for 2013
March 2013
2
Agenda
 The Coming Together of Cloud and Mobility
 IT Embedded Across Industries
 IT Security Market Evolution
 Social Media and Consumerisation
 Cloud and Mobile Threats
3
The Coming Together of Computing and Mobility
1970s1960s 1980s 1990s 2000
Mainframe
Supercomputer
2010
Cloud
Smart Phones
&
Tablets
Personal
Computer
Laptop/
Notebook
Mobile
Phone
(2G)
4
Mobile Ahead as Means of Connecting to the Internet
4
Source: Statcounter Global Stats, KPCB
5
Bandwidth Requirements
Emails
Internet
browsing
Social Networking
Online
Shopping
P2P File
Sharing
Real time Communications
Smart City Infrastructure
Tele-medicine
Connected Cars
Tele-education
Smart Grids
Next Generation TV
M2M
Application/ContentRequirements
< 1Mbps 3 - 7 Mbps 100 Mbps - 1 Gbps
Rich Communications o Increasing demand from consumers
for virtual equivalent communication
and entertainment experiences. For
example, low latency in high graphics
gaming.
o Demand from enterprises (e.g. SMEs)
for cost effective productivity
applications such as cloud computing.
o Demand from the public sector to
increase administrative efficiency via
smart city infrastructure.
NBN: Possibilities
ConvergenceBasic
Cloud Computing
High Speed Networks and Convergence
6
Example: Self-Driving Automobiles
• Google has been working on this for four years
now.
• Automobile manufacturers are also
researching including GM, BMW and Audi
• February 2012 – Nevada passes first laws in
the USA to allow driverless cars on its
highways.
• General Motors predicts the technology will
be standard by 2020.
Convergence of different industries? Security
Implications?
7
‘Virtual’ World Security Issues Massively Impacting
‘Physical’ World
South Korea
Steps Up
Security at
Nuclear Plants
8
1985-1995 1995-2005 2005-2015 2015 Onwards
Source: Frost & Sullivan.
Maladvertising
,Ransonware
PC Viruses
Spam
Internet
Viruses
Phishing,
Bots,
Spyware
DDOS,
Worms,
Trojans
Social Media,
Mobile, Cloud,
APTs Watering
holes
Impact
Cyber-
everything,
Threat Evolution and Impact
9
1,979.4
2,205.6
2,448.6
2,716.7
3,015.3
1,413.9
1,600.5
1,972.1
2,390.0
2,881.9
570.6
664.3
785.4
936.3
1,120.0
112.9 140.5 181.0 242.7 313.1
78.5 103.1 136.9 184.5 254.0
48.4 70.4 105.7 162.3
252.2
57.8 84.9 121.6 169.1 207.9
21.9 30.2 51.3 69.5 89.2
0.0
500.0
1,000.0
1,500.0
2,000.0
2,500.0
3,000.0
3,500.0
2011 2012 2013 2014 2015
Network Security
CAGR (2012-2015):
11.0%
MSS
CAGR (2012-2015):
21.7%
SCM
CAGR (2012-2015):
19.0%
SIEM
CAGR (2012-2015):
30.6%
WAF
CAGR (2012-2015):
35.0%
Virtualization Security
CAGR (2012-2015):
53.0%
DLP
CAGR (2012-2015):
34.8%
Mobile Security
CAGR (2012-2015):
43.5%
TotalRevenue(US$
Million)Security Market Size and Forecast
10
Social Media is now a Key Part of Customer Experience
Customers are
discussing your
products/services
Customers are sharing experiences online
Social Media gives you the ability to listen to customers,
even when they are not calling you
Social Media has the power to significantly impact your
business, so ignoring this channel is no longer an option
11
Social Media becomes Preferred Platform for Malware
• Social media is becoming the
most attractive platform for
malware as mobile devices
become the most attractive
hardware
• Young people are often very
susceptible to social media
scams as they are often less
cautious about sharing personal
information
• Spam and phishing is shifting to
social media platforms
12
Public
Domain
Personal
Domain
Professional
Domain
What the Individual wants:
 Persona Integration
 Single Device Mentality
 Freedom of Choice
Conflict Theatre – The Human Factor
What the Enterprise wants:
 Persona Differentiation
 Visibility into User Behaviors
 Power of Control
Public
Domain
Professiona
l Domain
Personal
Domain
Source: Frost & Sullivan
13
3.6
3.83.8
4.1
4.2
2.0
3.0
4.0
5.0
CostService Level
Agreement (SLA)
Service OfferingsUptime and
Reliability
Concerns
Security & Data
Privacy Concern
How would you rate the level of impact that the following factors have in your decision
making when it comes to cloud services in general?
MeanScore
APAC End-User Study – Adopting Cloud Services
N = 210.
Source: Frost & Sullivan
14
Mobile Security Revenue Forecast
-20.0
-10.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
90.0
100.0
2011 2012 2013 2014 2015
Revenue 21.9 30.2 51.3 69.5 89.2
Growth Rate 37.9 69.9 35.5 28.3
Revenue($Million)
Mobile Security Market: Revenue Forecast
APAC, 2012–2015
CAGR = 43.5%
-
GrowthRate
(%)
Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
15
Android: A Mecca for Malware
• OS fragmentation – mobile carriers not pushing updates aggressively enough.
Google controlled Nexus 4 is much more secure.
• Exposed source code and dominant mobile platform.
• Source of malware is often apps e.g, fake Instagram and fake Angry Birds that
send messages to premium rate SMS services.
• Linux based code is familiar territory for many hackers
• Will Google and the carriers respond?
16
Conclusions
• IT security is now having a profound effect on the „physical world‟.
• Embedded IT is massively increasing the potential impact
• Cloud, mobile and social are driving new security threats
• Cyberespionage and cybersabotage are becoming a reality. – more state
sponsored cyber attacks
• “Just as nuclear was the strategic warfare of the industrial era, cyber warfare
has become the strategic warfare of the information era” US Secretary of
Defence, Leon Panetta.
17
Thank You
For further questions and enquiries
Andrew Milroy
Vice President - ICT
Frost & Sullivan
Email: andrew.milroy@frost.com
Twitter: andy1994

Mais conteúdo relacionado

Mais procurados

The Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTsThe Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTsmobilesquared Ltd
 
Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)Ramesh Kumar
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivNOAH Advisors
 
Technology Trends 2016 Part I
Technology Trends 2016 Part ITechnology Trends 2016 Part I
Technology Trends 2016 Part IAxel & Boris™
 
Enforcing accountability in media using blockchain
Enforcing accountability in media using blockchainEnforcing accountability in media using blockchain
Enforcing accountability in media using blockchainRob Van Den Dam
 
Telecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launchTelecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launchBella Harris
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Future of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomyFuture of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomyMauricio Vetrano
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)Dan Mo
 
Mobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunitiesMobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunitiesBloomberg LP
 
Mobile Monday on FreSh
Mobile Monday on FreShMobile Monday on FreSh
Mobile Monday on FreShPitra Satvika
 
20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1 20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1 The Valley
 
2014 Fortune 500 infographic
2014 Fortune 500 infographic2014 Fortune 500 infographic
2014 Fortune 500 infographicAppDirect
 
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
 The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic... The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic...
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...marketresearchreports.biz
 

Mais procurados (20)

The Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTsThe Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTs
 
Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
Technology Trends 2016 Part I
Technology Trends 2016 Part ITechnology Trends 2016 Part I
Technology Trends 2016 Part I
 
Enforcing accountability in media using blockchain
Enforcing accountability in media using blockchainEnforcing accountability in media using blockchain
Enforcing accountability in media using blockchain
 
Telecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launchTelecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launch
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Future of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomyFuture of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomy
 
The mobile economy_2013
The mobile economy_2013The mobile economy_2013
The mobile economy_2013
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)
 
Mobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunitiesMobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunities
 
Mobile Monday on FreSh
Mobile Monday on FreShMobile Monday on FreSh
Mobile Monday on FreSh
 
20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1 20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1
 
2014 Fortune 500 infographic
2014 Fortune 500 infographic2014 Fortune 500 infographic
2014 Fortune 500 infographic
 
Internet of Things Facts and Stats
Internet of Things Facts and StatsInternet of Things Facts and Stats
Internet of Things Facts and Stats
 
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
 The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic... The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic...
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
 

Semelhante a Top Security Trends and Takeaways for 2013

2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)CM Research
 
Ltb2014 digital deployment as a competitive advantage-shaun collins
Ltb2014   digital deployment as a competitive advantage-shaun collinsLtb2014   digital deployment as a competitive advantage-shaun collins
Ltb2014 digital deployment as a competitive advantage-shaun collinsKPN Zakelijke Markt
 
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021Occams Business Research & Consulting
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointFelipe Lamus
 
Telecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyondTelecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyondAhmad Yokasano
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosFrancesca Valente
 
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013 Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013 Evgeniy Kozlov
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
Ash Dahod Mobile Data Deluge
Ash Dahod Mobile Data DelugeAsh Dahod Mobile Data Deluge
Ash Dahod Mobile Data DelugeChristine Nolan
 
Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit William Barney
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)CM Research
 
Technology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforceTechnology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforceIMC Institute
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Oscar Romano
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionPaul Van Doorn
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...Knud Lasse Lueth
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoTAnalytics
 

Semelhante a Top Security Trends and Takeaways for 2013 (20)

2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)
 
Ltb2014 digital deployment as a competitive advantage-shaun collins
Ltb2014   digital deployment as a competitive advantage-shaun collinsLtb2014   digital deployment as a competitive advantage-shaun collins
Ltb2014 digital deployment as a competitive advantage-shaun collins
 
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power Point
 
Telecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyondTelecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyond
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013 Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
A Mobile First Future
A Mobile First FutureA Mobile First Future
A Mobile First Future
 
Ash Dahod Mobile Data Deluge
Ash Dahod Mobile Data DelugeAsh Dahod Mobile Data Deluge
Ash Dahod Mobile Data Deluge
 
Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)
 
Technology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforceTechnology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforce
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosion
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
 

Mais de Graeme Wood

TechCatalyst free assessment
TechCatalyst free assessment TechCatalyst free assessment
TechCatalyst free assessment Graeme Wood
 
TechCatalyst Corporate Overview
TechCatalyst Corporate Overview TechCatalyst Corporate Overview
TechCatalyst Corporate Overview Graeme Wood
 
How does semantic technology work?
How does semantic technology work? How does semantic technology work?
How does semantic technology work? Graeme Wood
 
AI and the Financial Service Segment
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service SegmentGraeme Wood
 
Ai and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewAi and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewGraeme Wood
 
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Graeme Wood
 
Introduction to Semantic Computing
Introduction to Semantic ComputingIntroduction to Semantic Computing
Introduction to Semantic ComputingGraeme Wood
 
AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721Graeme Wood
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 
Raimund genes from traditional malware to targeted attacks
Raimund genes    from traditional malware to targeted attacksRaimund genes    from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacksGraeme Wood
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Graeme Wood
 
Anz cloud thought leadership 16 mar
Anz cloud thought leadership 16 marAnz cloud thought leadership 16 mar
Anz cloud thought leadership 16 marGraeme Wood
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 

Mais de Graeme Wood (15)

TechCatalyst free assessment
TechCatalyst free assessment TechCatalyst free assessment
TechCatalyst free assessment
 
TechCatalyst Corporate Overview
TechCatalyst Corporate Overview TechCatalyst Corporate Overview
TechCatalyst Corporate Overview
 
How does semantic technology work?
How does semantic technology work? How does semantic technology work?
How does semantic technology work?
 
AI and the Financial Service Segment
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service Segment
 
Ai and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewAi and Legal Industy - Executive Overview
Ai and Legal Industy - Executive Overview
 
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing
 
Introduction to Semantic Computing
Introduction to Semantic ComputingIntroduction to Semantic Computing
Introduction to Semantic Computing
 
AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Raimund genes from traditional malware to targeted attacks
Raimund genes    from traditional malware to targeted attacksRaimund genes    from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010
 
Anz cloud thought leadership 16 mar
Anz cloud thought leadership 16 marAnz cloud thought leadership 16 mar
Anz cloud thought leadership 16 mar
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Top Security Trends and Takeaways for 2013

  • 1. Top Security Trends and Takeaways for 2013 March 2013
  • 2. 2 Agenda  The Coming Together of Cloud and Mobility  IT Embedded Across Industries  IT Security Market Evolution  Social Media and Consumerisation  Cloud and Mobile Threats
  • 3. 3 The Coming Together of Computing and Mobility 1970s1960s 1980s 1990s 2000 Mainframe Supercomputer 2010 Cloud Smart Phones & Tablets Personal Computer Laptop/ Notebook Mobile Phone (2G)
  • 4. 4 Mobile Ahead as Means of Connecting to the Internet 4 Source: Statcounter Global Stats, KPCB
  • 5. 5 Bandwidth Requirements Emails Internet browsing Social Networking Online Shopping P2P File Sharing Real time Communications Smart City Infrastructure Tele-medicine Connected Cars Tele-education Smart Grids Next Generation TV M2M Application/ContentRequirements < 1Mbps 3 - 7 Mbps 100 Mbps - 1 Gbps Rich Communications o Increasing demand from consumers for virtual equivalent communication and entertainment experiences. For example, low latency in high graphics gaming. o Demand from enterprises (e.g. SMEs) for cost effective productivity applications such as cloud computing. o Demand from the public sector to increase administrative efficiency via smart city infrastructure. NBN: Possibilities ConvergenceBasic Cloud Computing High Speed Networks and Convergence
  • 6. 6 Example: Self-Driving Automobiles • Google has been working on this for four years now. • Automobile manufacturers are also researching including GM, BMW and Audi • February 2012 – Nevada passes first laws in the USA to allow driverless cars on its highways. • General Motors predicts the technology will be standard by 2020. Convergence of different industries? Security Implications?
  • 7. 7 ‘Virtual’ World Security Issues Massively Impacting ‘Physical’ World South Korea Steps Up Security at Nuclear Plants
  • 8. 8 1985-1995 1995-2005 2005-2015 2015 Onwards Source: Frost & Sullivan. Maladvertising ,Ransonware PC Viruses Spam Internet Viruses Phishing, Bots, Spyware DDOS, Worms, Trojans Social Media, Mobile, Cloud, APTs Watering holes Impact Cyber- everything, Threat Evolution and Impact
  • 9. 9 1,979.4 2,205.6 2,448.6 2,716.7 3,015.3 1,413.9 1,600.5 1,972.1 2,390.0 2,881.9 570.6 664.3 785.4 936.3 1,120.0 112.9 140.5 181.0 242.7 313.1 78.5 103.1 136.9 184.5 254.0 48.4 70.4 105.7 162.3 252.2 57.8 84.9 121.6 169.1 207.9 21.9 30.2 51.3 69.5 89.2 0.0 500.0 1,000.0 1,500.0 2,000.0 2,500.0 3,000.0 3,500.0 2011 2012 2013 2014 2015 Network Security CAGR (2012-2015): 11.0% MSS CAGR (2012-2015): 21.7% SCM CAGR (2012-2015): 19.0% SIEM CAGR (2012-2015): 30.6% WAF CAGR (2012-2015): 35.0% Virtualization Security CAGR (2012-2015): 53.0% DLP CAGR (2012-2015): 34.8% Mobile Security CAGR (2012-2015): 43.5% TotalRevenue(US$ Million)Security Market Size and Forecast
  • 10. 10 Social Media is now a Key Part of Customer Experience Customers are discussing your products/services Customers are sharing experiences online Social Media gives you the ability to listen to customers, even when they are not calling you Social Media has the power to significantly impact your business, so ignoring this channel is no longer an option
  • 11. 11 Social Media becomes Preferred Platform for Malware • Social media is becoming the most attractive platform for malware as mobile devices become the most attractive hardware • Young people are often very susceptible to social media scams as they are often less cautious about sharing personal information • Spam and phishing is shifting to social media platforms
  • 12. 12 Public Domain Personal Domain Professional Domain What the Individual wants:  Persona Integration  Single Device Mentality  Freedom of Choice Conflict Theatre – The Human Factor What the Enterprise wants:  Persona Differentiation  Visibility into User Behaviors  Power of Control Public Domain Professiona l Domain Personal Domain Source: Frost & Sullivan
  • 13. 13 3.6 3.83.8 4.1 4.2 2.0 3.0 4.0 5.0 CostService Level Agreement (SLA) Service OfferingsUptime and Reliability Concerns Security & Data Privacy Concern How would you rate the level of impact that the following factors have in your decision making when it comes to cloud services in general? MeanScore APAC End-User Study – Adopting Cloud Services N = 210. Source: Frost & Sullivan
  • 14. 14 Mobile Security Revenue Forecast -20.0 -10.0 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 90.0 100.0 2011 2012 2013 2014 2015 Revenue 21.9 30.2 51.3 69.5 89.2 Growth Rate 37.9 69.9 35.5 28.3 Revenue($Million) Mobile Security Market: Revenue Forecast APAC, 2012–2015 CAGR = 43.5% - GrowthRate (%) Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
  • 15. 15 Android: A Mecca for Malware • OS fragmentation – mobile carriers not pushing updates aggressively enough. Google controlled Nexus 4 is much more secure. • Exposed source code and dominant mobile platform. • Source of malware is often apps e.g, fake Instagram and fake Angry Birds that send messages to premium rate SMS services. • Linux based code is familiar territory for many hackers • Will Google and the carriers respond?
  • 16. 16 Conclusions • IT security is now having a profound effect on the „physical world‟. • Embedded IT is massively increasing the potential impact • Cloud, mobile and social are driving new security threats • Cyberespionage and cybersabotage are becoming a reality. – more state sponsored cyber attacks • “Just as nuclear was the strategic warfare of the industrial era, cyber warfare has become the strategic warfare of the information era” US Secretary of Defence, Leon Panetta.
  • 17. 17 Thank You For further questions and enquiries Andrew Milroy Vice President - ICT Frost & Sullivan Email: andrew.milroy@frost.com Twitter: andy1994