Enviar pesquisa
Carregar
Mr. Khalid Shaikh - emerging trends in managing it security
•
Transferir como PPT, PDF
•
2 gostaram
•
767 visualizações
N
nooralmousa
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 13
Baixar agora
Recomendados
Mobile Industry Preparing to Surf the 4G Disruption Wave: Key CTIA Takeaways
Mobile Industry Preparing to Surf the 4G Disruption Wave: Key CTIA Takeaways
guestb993cd99
Ncomms2255 s1
Ncomms2255 s1
Carlos Bella
The Evolution of Mobile Information Services
The Evolution of Mobile Information Services
Venu Vasudevan
CloudBridge and Repeater Specifications Sheet
CloudBridge and Repeater Specifications Sheet
Nuno Alves
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
nooralmousa
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
nooralmousa
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.
nooralmousa
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
Recomendados
Mobile Industry Preparing to Surf the 4G Disruption Wave: Key CTIA Takeaways
Mobile Industry Preparing to Surf the 4G Disruption Wave: Key CTIA Takeaways
guestb993cd99
Ncomms2255 s1
Ncomms2255 s1
Carlos Bella
The Evolution of Mobile Information Services
The Evolution of Mobile Information Services
Venu Vasudevan
CloudBridge and Repeater Specifications Sheet
CloudBridge and Repeater Specifications Sheet
Nuno Alves
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
nooralmousa
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
nooralmousa
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.
nooralmousa
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
Examples of Systance's interventions
Examples of Systance's interventions
Bernard JOUVEL
GIS In Local Government Global Image
GIS In Local Government Global Image
GIS Global Image
Ppt si-03-eng
Ppt si-03-eng
valbasp
Appcelerator Mobile Development Platform
Appcelerator Mobile Development Platform
rickross
09 03
09 03
Sowjanya Palagiri P
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazione
guestd1ae161
5 isu and-wbs_tf-gusmeroli
5 isu and-wbs_tf-gusmeroli
Digital Business Innovation Community
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
Kim Escherich
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a reality
BSP Media Group
Ramon Montero's Presentation
Ramon Montero's Presentation
guest41c26d
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Thierry Lestable
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324
Galen Hsieh
Introduction To Xener Systems
Introduction To Xener Systems
Guisun Han
Net blazr at is4cwn
Net blazr at is4cwn
Brough Turner
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
Puran Pangeni
Cloud Foundry Architecture and Overview
Cloud Foundry Architecture and Overview
rajdeep
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri Lanka
Wasantha Deshapriya
Document Management In Pharma
Document Management In Pharma
dhiria00
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
Heru Sutadi
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Sustainable Resources Management
Mr. Vivek Ramachandran - Advanced Wi-Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-Fi Security Penetration Testing
nooralmousa
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
nooralmousa
Mais conteúdo relacionado
Semelhante a Mr. Khalid Shaikh - emerging trends in managing it security
Examples of Systance's interventions
Examples of Systance's interventions
Bernard JOUVEL
GIS In Local Government Global Image
GIS In Local Government Global Image
GIS Global Image
Ppt si-03-eng
Ppt si-03-eng
valbasp
Appcelerator Mobile Development Platform
Appcelerator Mobile Development Platform
rickross
09 03
09 03
Sowjanya Palagiri P
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazione
guestd1ae161
5 isu and-wbs_tf-gusmeroli
5 isu and-wbs_tf-gusmeroli
Digital Business Innovation Community
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
Kim Escherich
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a reality
BSP Media Group
Ramon Montero's Presentation
Ramon Montero's Presentation
guest41c26d
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Thierry Lestable
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324
Galen Hsieh
Introduction To Xener Systems
Introduction To Xener Systems
Guisun Han
Net blazr at is4cwn
Net blazr at is4cwn
Brough Turner
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
Puran Pangeni
Cloud Foundry Architecture and Overview
Cloud Foundry Architecture and Overview
rajdeep
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri Lanka
Wasantha Deshapriya
Document Management In Pharma
Document Management In Pharma
dhiria00
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
Heru Sutadi
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Sustainable Resources Management
Semelhante a Mr. Khalid Shaikh - emerging trends in managing it security
(20)
Examples of Systance's interventions
Examples of Systance's interventions
GIS In Local Government Global Image
GIS In Local Government Global Image
Ppt si-03-eng
Ppt si-03-eng
Appcelerator Mobile Development Platform
Appcelerator Mobile Development Platform
09 03
09 03
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazione
5 isu and-wbs_tf-gusmeroli
5 isu and-wbs_tf-gusmeroli
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a reality
Ramon Montero's Presentation
Ramon Montero's Presentation
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324
Introduction To Xener Systems
Introduction To Xener Systems
Net blazr at is4cwn
Net blazr at is4cwn
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
Cloud Foundry Architecture and Overview
Cloud Foundry Architecture and Overview
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri Lanka
Document Management In Pharma
Document Management In Pharma
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Mais de nooralmousa
Mr. Vivek Ramachandran - Advanced Wi-Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-Fi Security Penetration Testing
nooralmousa
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
nooralmousa
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
nooralmousa
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
nooralmousa
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
nooralmousa
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
nooralmousa
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
nooralmousa
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
nooralmousa
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
nooralmousa
Khaled al amri using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
nooralmousa
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
nooralmousa
Ghassan farra it security a cio perspective
Ghassan farra it security a cio perspective
nooralmousa
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
nooralmousa
Mais de nooralmousa
(13)
Mr. Vivek Ramachandran - Advanced Wi-Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-Fi Security Penetration Testing
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
Khaled al amri using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Ghassan farra it security a cio perspective
Ghassan farra it security a cio perspective
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
Último
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Último
(20)
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
How to write a Business Continuity Plan
How to write a Business Continuity Plan
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Mr. Khalid Shaikh - emerging trends in managing it security
1.
Emerging Trends in
Managing IT Security May 2012 Presentation by: Khalid Shaikh – Practice Head for IT Security and Privacy Services
2.
Changing Business Needs
1980 2000 2010 and beyond Internet Public Telephone Evolution Transformation Digital Set Top Customers Telephone, Third Telephone, Internet Third Internet Parties & Third Parties Parties & Third Parties Internet Third Internet Router Router Satellite dish Parties Lightpath ` ` Internet Internet Satellite dish Satellite dish Frame Optimum Cable Modem Relay Online Customers Optimum Oracle Online Optimum Untrusted Lightpath Corporate Cable Modem Corporate Cable Modem Customers Online Backbone Customers Backbone Customers Backbone Other Businesses and/or New Businesses Voice Voice Network Satellite dish Network Satellite dish Router Router Cable Frame Internet Relay Terminal Server PBX PBX Rainbow Media Lightpath Lightpath Digital Digital Set Top Set Top Customers Internet Employees & Customers Customers Third Parties Lightpath Public Satellite dish Lightpath Public Customers Telephone Customers Telephone 2 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
3.
Emerging Technologies 3
© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
4.
Trends in IT
Security Attack TREND 1 : Industrial Threats TREND 2 : Threats Within: Embedded Hardware TREND 3 : Hacktivism TREND 4 : Web Threats…. TREND 5 : Mobile Threats 4 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
5.
Recent Events 5
© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
6.
Motives of Attack
• Industrial Espionage • Financial • Military • Ideological • Politics • Prestige 6 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
7.
Attack Tools are
Freely Available 7 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
8.
Security Never Sleeps
• Increasing sophistications of attacks • Protect data and information • Keeping up-to-date with security incidents and solutions • Keeping the IT infrastructure in compliance with the IT Security Policy of the organization • Keeping up-to-date with the changes to legal and regulatory requirements • Reacting effectively and timely to security violations • Effectively managing threats to data security • Complexity of managing a broad portfolio of security tools/solutions • Mobile clients and unmanaged devices • Periodically conducting security awareness trainings to users within the organization 8 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
9.
Holistic Approach in
Managing IT Security Information Security Vision and Strategy Business Initiatives Threats Senior Management Commitment Best/Acceptable Practice Training and Awareness Enterprise Architecture Legislation Strategy Vulnerability & Risk Assessment Security Policy Security Architecture and Technical Standards Administrative and End-User Guidelines, Practices and Procedures Enforcement Monitoring Recovery Process Process Process Information Security Management 9 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
10.
Holistic Approach in
Managing IT Security 10 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
11.
Prediction – Persistence
– Patience - Preparedness 11 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
12.
If You Have
Further Questions: Please visit us at Booth Number 8 and 9. Khalid Shaikh Phone: (965) – 66225122 Senior Manager – Technology khalid.shaikh@protivitiglobal.com.kw Risk Services Powerful Insights. Proven Delivery.™ 12 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
13.
13
© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
Baixar agora