SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Security Trends and Innovations

      Bulent Teksoz
      Chief Security Strategist for Emerging Markets
            @bteksoz



Kuwait Info Security Conference – May 2012
Bad News
           Good News

@bteksoz   Kuwait Info Security Conference – May 2012   2
@bteksoz   Kuwait Info Security Conference – May 2012   3
Targeted Attacks by Sector


                                                       Government & Public Sector
                                                       Manufacturing
                                                       Finance
                                                       IT Services
                                                       Chemical & Pharmaceutical
                                                       Transport & Utilities
                                                       Non-Profit
                                                       Marketing & Media
                                                       Education
                                                       Retail




  @bteksoz              Kuwait Info Security Conference – May 2012                 4
@bteksoz   Kuwait Info Security Conference – May 2012   5
@bteksoz   Kuwait Info Security Conference – May 2012   6
Four Key Trends




Malware Targeted                     Mobile      Data
Attacks         Attacks              Threats   Breaches
 Internet Security Threat
                Expand
81% Report, Vol. 17
      ↑                             Expose All on Rise

    @bteksoz                Kuwait Info Security Conference – May 2012   7
What about Kuwait?




@bteksoz        Kuwait Info Security Conference – May 2012   8
@bteksoz   Kuwait Info Security Conference – May 2012   9
@bteksoz   Kuwait Info Security Conference – May 2012   10
@bteksoz   Kuwait Info Security Conference – May 2012   11
What’s Ahead in 2012?

                                                 Attackers will
                                                  capitalize on
                                                 work/personal
      Macs are not                              info on mobiles
       immune



                                             Cloud computing
                                              and mobile will
       Targeted attacks                     force IT to rethink
         will continue                           security



  @bteksoz                Kuwait Info Security Conference – May 2012   12
The Big Question




How secure are we now?


  @bteksoz         Kuwait Info Security Conference – May 2012   14
One Dashboard




  @bteksoz      Kuwait Info Security Conference – May 2012   15
Summary – What does that mean?

• Risk - volume becoming impossible to manage
• Acceptance that breaches will occur
• Change in focus from asset to information
• Business demands – consolidate security (Back to
  basics)
 – Risk based approach (Information & identity centric)
 – Security must become a two way street (stop exfiltration of
   data)
 – Smarter Intelligence
 – Centralized correlated timely visibility & activity

                                                                 16
Thank you!
Bulent Teksoz


                                                    @bteksoz

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


  @bteksoz                                                                          Kuwait Info Security Conference – May 2012                                                 17

Mais conteúdo relacionado

Mais procurados

Are You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAre You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAjeet Singh
 
Chapter 1 introduction to security
Chapter 1 introduction to securityChapter 1 introduction to security
Chapter 1 introduction to securitynewbie2019
 
IoT Can Revolutionize Healthcare, But Security Is Key
IoT Can Revolutionize Healthcare, But Security Is KeyIoT Can Revolutionize Healthcare, But Security Is Key
IoT Can Revolutionize Healthcare, But Security Is KeyAjeet Singh
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...Black Duck by Synopsys
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!Ajeet Singh
 
Cybersecurity and Privacy in ESG Digital Transformation
Cybersecurity and Privacy in ESG Digital TransformationCybersecurity and Privacy in ESG Digital Transformation
Cybersecurity and Privacy in ESG Digital TransformationAlex G. Lee, Ph.D. Esq. CLP
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questionsBill McCabe
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013John Earnhardt
 
AI+Blockchain+IoT Integration Innovation Insights from Patents
AI+Blockchain+IoT Integration Innovation Insights from PatentsAI+Blockchain+IoT Integration Innovation Insights from Patents
AI+Blockchain+IoT Integration Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions Cigniti Technologies Ltd
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Aarkstore Enterprise
 

Mais procurados (17)

Are You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAre You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of Threats
 
Chapter 1 introduction to security
Chapter 1 introduction to securityChapter 1 introduction to security
Chapter 1 introduction to security
 
IoT Can Revolutionize Healthcare, But Security Is Key
IoT Can Revolutionize Healthcare, But Security Is KeyIoT Can Revolutionize Healthcare, But Security Is Key
IoT Can Revolutionize Healthcare, But Security Is Key
 
Elliot Systems
Elliot Systems Elliot Systems
Elliot Systems
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!
 
Cybersecurity and Privacy in ESG Digital Transformation
Cybersecurity and Privacy in ESG Digital TransformationCybersecurity and Privacy in ESG Digital Transformation
Cybersecurity and Privacy in ESG Digital Transformation
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
AI+Blockchain+IoT Integration Innovation Insights from Patents
AI+Blockchain+IoT Integration Innovation Insights from PatentsAI+Blockchain+IoT Integration Innovation Insights from Patents
AI+Blockchain+IoT Integration Innovation Insights from Patents
 
IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
 

Semelhante a Mr. Bulent Teksoz - Security trends and innovations

It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareMarie-Michelle Strah, PhD
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsIDC Italy
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptxoldmanegan
 
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdfThe Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdfCIO Look Magazine
 
Presentatie php benelux groep
Presentatie php benelux groepPresentatie php benelux groep
Presentatie php benelux groepDerk Yntema
 
Presentatie van Mateen Greenway
Presentatie van Mateen Greenway Presentatie van Mateen Greenway
Presentatie van Mateen Greenway ITInnovationDayNL
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfJPLoft Solutions
 
Big Data, Big Deal
Big Data,  Big DealBig Data,  Big Deal
Big Data, Big DealPiyush Malik
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
 
The 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdfThe 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdfCIO Look Magazine
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Ulrich Seldeslachts
 
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsSoftware Park Thailand
 
IoT and BD Introduction
IoT and BD IntroductionIoT and BD Introduction
IoT and BD IntroductionWayne Sun
 

Semelhante a Mr. Bulent Teksoz - Security trends and innovations (20)

It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for HealthcareIt's About the Data, Stupid: Mobile Security and BYOD for Healthcare
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptx
 
Appsec Introduction
Appsec IntroductionAppsec Introduction
Appsec Introduction
 
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdfThe Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdf
 
Presentatie php benelux groep
Presentatie php benelux groepPresentatie php benelux groep
Presentatie php benelux groep
 
Presentatie van Mateen Greenway
Presentatie van Mateen Greenway Presentatie van Mateen Greenway
Presentatie van Mateen Greenway
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 
Big Data, Big Deal
Big Data,  Big DealBig Data,  Big Deal
Big Data, Big Deal
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
The 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdfThe 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdf
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
MOBES project
MOBES projectMOBES project
MOBES project
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to ProfessionalsICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
 
IoT and BD Introduction
IoT and BD IntroductionIoT and BD Introduction
IoT and BD Introduction
 

Mais de nooralmousa

Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testingnooralmousa
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub  - A case study of django web applications that are secur...Mr. Mohammed Aldoub  - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...nooralmousa
 
Mr. Khalid Shaikh - emerging trends in managing it security
Mr. Khalid Shaikh  - emerging trends in managing it securityMr. Khalid Shaikh  - emerging trends in managing it security
Mr. Khalid Shaikh - emerging trends in managing it securitynooralmousa
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...nooralmousa
 
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.nooralmousa
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsnooralmousa
 
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for cisonooralmousa
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metricsnooralmousa
 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keysnooralmousa
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudnooralmousa
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 

Mais de nooralmousa (17)

Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub  - A case study of django web applications that are secur...Mr. Mohammed Aldoub  - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
 
Mr. Khalid Shaikh - emerging trends in managing it security
Mr. Khalid Shaikh  - emerging trends in managing it securityMr. Khalid Shaikh  - emerging trends in managing it security
Mr. Khalid Shaikh - emerging trends in managing it security
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
 
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
 
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 

Mr. Bulent Teksoz - Security trends and innovations

  • 1. Security Trends and Innovations Bulent Teksoz Chief Security Strategist for Emerging Markets @bteksoz Kuwait Info Security Conference – May 2012
  • 2. Bad News Good News @bteksoz Kuwait Info Security Conference – May 2012 2
  • 3. @bteksoz Kuwait Info Security Conference – May 2012 3
  • 4. Targeted Attacks by Sector Government & Public Sector Manufacturing Finance IT Services Chemical & Pharmaceutical Transport & Utilities Non-Profit Marketing & Media Education Retail @bteksoz Kuwait Info Security Conference – May 2012 4
  • 5. @bteksoz Kuwait Info Security Conference – May 2012 5
  • 6. @bteksoz Kuwait Info Security Conference – May 2012 6
  • 7. Four Key Trends Malware Targeted Mobile Data Attacks Attacks Threats Breaches Internet Security Threat Expand 81% Report, Vol. 17 ↑ Expose All on Rise @bteksoz Kuwait Info Security Conference – May 2012 7
  • 8. What about Kuwait? @bteksoz Kuwait Info Security Conference – May 2012 8
  • 9. @bteksoz Kuwait Info Security Conference – May 2012 9
  • 10. @bteksoz Kuwait Info Security Conference – May 2012 10
  • 11. @bteksoz Kuwait Info Security Conference – May 2012 11
  • 12. What’s Ahead in 2012? Attackers will capitalize on work/personal Macs are not info on mobiles immune Cloud computing and mobile will Targeted attacks force IT to rethink will continue security @bteksoz Kuwait Info Security Conference – May 2012 12
  • 13. The Big Question How secure are we now? @bteksoz Kuwait Info Security Conference – May 2012 14
  • 14. One Dashboard @bteksoz Kuwait Info Security Conference – May 2012 15
  • 15. Summary – What does that mean? • Risk - volume becoming impossible to manage • Acceptance that breaches will occur • Change in focus from asset to information • Business demands – consolidate security (Back to basics) – Risk based approach (Information & identity centric) – Security must become a two way street (stop exfiltration of data) – Smarter Intelligence – Centralized correlated timely visibility & activity 16
  • 16. Thank you! Bulent Teksoz @bteksoz Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. @bteksoz Kuwait Info Security Conference – May 2012 17

Notas do Editor

  1.  
  2. ISTR 17 DataSector information …. Gov’t and public sector target is big, but other sectors are being attacked as well Lots of other industries are being targeted – not just gov’t and public sector … Key takeaway? Companies of all sizes and sectors need to be vigilant.
  3. There is so much information that is covered in the ISTR 17 that we can’t cover it all in this one discussion. So, we’ve tried to focus on key trends in the ISTR – these are trends that the data spoke to and we thought were worth emphasizingWe’ll look at all of these in more detail over the following slides.
  4. So … that’s a quick overview of some of the key trends we saw in the ISTR 17 – there is a lot more information available online at www.symantec.com/threatrerportKey trends we see for 2012?Macs are not immune to malwareThe use of Java for cross-platform attacks was discussed in ISTR 16Targeted attacks will be ongoing and will expandMalware authors will capitalize on co-mingling of work and personal lives on mobile devices As financial transactions move to mobile devices, they will followCloud computing and mobile will force IT to rethink security
  5. Big Numbers for 2011: Interesting ups and downsThese are the big numbers from the infographics we looked at earlier … with a bit more explanation. Red and Green Arrows (explanation): Red = going up is a “bad” thing – Green = going down is a “good” thingAlmost doubled # of attacks blocked from 2010 – many of the blocked attacks have shifted from AV signatures to IPS – this is important for customers to know – IPS can 403 million unique variants of malware – very significant growth over 2010.Interesting things – you would have expected vulnerabilities to go up with more attacks, but that’s not the case0-day vulnerabilities dropped – we’ll talk more about that later.there was a big jump in mobile vulnerabilities – it’s still new a platform and being explored by malware authors – we expect to see more increases on that frontSpam has dropped – 34% decrease – dramatic drop – will look at that later