SlideShare uma empresa Scribd logo
1 de 13
Emerging Trends in Managing
IT Security

May 2012

Presentation by: Khalid Shaikh – Practice Head for
IT Security and Privacy Services
Changing Business Needs
                                          1980                                                                                                         2000                                                                                                       2010 and beyond

                                                                                                                                                              Internet                                                                                                                                                   Public
                                                                                                                                                                                                                                                                                                                       Telephone


                                                                                              Evolution                                                                                                                Transformation                                              Digital
                                                                                                                                                                                                                                                                                  Set Top
                                                                                                                                                                                                                                                                                 Customers
                                                                Telephone,                                                       Third                                                    Telephone, Internet
                Third
                                                                  Internet                                                      Parties                                                     & Third Parties
               Parties
                                                               & Third Parties


    Internet                                                                                               Third    Internet                  Router
                           Router                                                                                                                                                                                                                            Satellite dish
                                                                                                          Parties
                                                                                                                                                                                                                                                                                                                           Lightpath
                                                           `                                                                                                                        `
                                                                                   Internet                                                                                                                       Internet
                                                                                                                                   Satellite dish
                 Satellite dish       Frame               Optimum                                                                                                                                                                           Cable Modem
                                      Relay                Online                                                                                                                                                                            Customers
                                                                                                                                                                                        Optimum
                           Oracle                                                                                                                                                        Online
                                                                                                                                                                                                                                                                       Optimum         Untrusted                               Lightpath
                                          Corporate                              Cable Modem                                                                   Corporate                                        Cable Modem                                                                                                    Customers
                                                                                                                                                                                                                                                                        Online
                                          Backbone                                Customers                                                                    Backbone                                          Customers                                                             Backbone    Other Businesses
                                                                                                                                                                                                                                                                                                        and/or
                                                                                                                                                                                                                                                                                                   New Businesses
                                                 Voice                                                                                                                    Voice
                                                Network    Satellite dish                                                                                                Network          Satellite dish
                           Router                                                                                                             Router
                                                                                                                               Cable                                                                                                                                                                                          Frame
                                                                                                                                                                                                                                                  Internet                                                                    Relay
                                                                                                                                  Terminal Server
                                  PBX                                                                                                                  PBX                    Rainbow Media
                                        Lightpath                                                                                                            Lightpath
       Digital                                                                                                          Digital
      Set Top                                                                                                          Set Top
                                                                                                                      Customers                                                                                                  Internet   Employees &
     Customers                                                                                                                                                                                                                  Customers   Third Parties



               Lightpath              Public                                                                                                                                                                                                                                                              Satellite dish
                                                                                                                                Lightpath                 Public
               Customers            Telephone                                                                                   Customers               Telephone




2    © 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
Emerging Technologies




3   © 2012 Protiviti Member Firm Kuwait W.L.L
    PUBLIC: 4th Kuwait Info Security Conference
Trends in IT Security Attack

    TREND 1 : Industrial Threats

    TREND 2 : Threats Within: Embedded Hardware

    TREND 3 : Hacktivism

    TREND 4 : Web Threats….

    TREND 5 : Mobile Threats




4    © 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
Recent Events




5   © 2012 Protiviti Member Firm Kuwait W.L.L
    PUBLIC: 4th Kuwait Info Security Conference
Motives of Attack

    •    Industrial Espionage
    •    Financial
    •    Military
    •    Ideological
    •    Politics
    •    Prestige




6       © 2012 Protiviti Member Firm Kuwait W.L.L
        PUBLIC: 4th Kuwait Info Security Conference
Attack Tools are Freely Available




7    © 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
Security Never Sleeps

    • Increasing sophistications of attacks
    • Protect data and information
    • Keeping up-to-date with security incidents and solutions
    • Keeping the IT infrastructure in compliance with the IT Security Policy of the
      organization
    • Keeping up-to-date with the changes to legal and regulatory requirements
    • Reacting effectively and timely to security violations
    • Effectively managing threats to data security
    • Complexity of managing a broad portfolio of security tools/solutions
    • Mobile clients and unmanaged devices
    • Periodically conducting security awareness trainings to users within the
      organization




8    © 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
Holistic Approach in Managing IT Security

                                                                                 Information Security Vision and Strategy

                                                                                           Business Initiatives
                                                                                                                           Threats
    Senior Management Commitment




                                                                                            Best/Acceptable
                                                                                               Practice




                                                                                                                                                   Training and Awareness
                                              Enterprise Architecture                          Legislation
                                                     Strategy                                                               Vulnerability & Risk
                                                                                                                               Assessment
                                                                                              Security Policy


                                                                                 Security Architecture and Technical Standards


                                                                   Administrative and End-User Guidelines, Practices and Procedures


                                                 Enforcement                                   Monitoring                            Recovery
                                                     Process                                     Process                             Process


                                                                                    Information Security Management


9                                  © 2012 Protiviti Member Firm Kuwait W.L.L
                                   PUBLIC: 4th Kuwait Info Security Conference
Holistic Approach in Managing IT Security




10    © 2012 Protiviti Member Firm Kuwait W.L.L
      PUBLIC: 4th Kuwait Info Security Conference
Prediction – Persistence – Patience - Preparedness




11   © 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference
If You Have Further Questions: Please visit us
     at Booth Number 8 and 9.


       Khalid Shaikh                                Phone: (965) – 66225122
       Senior Manager – Technology                  khalid.shaikh@protivitiglobal.com.kw
       Risk Services




          Powerful Insights. Proven Delivery.™




12    © 2012 Protiviti Member Firm Kuwait W.L.L
      PUBLIC: 4th Kuwait Info Security Conference
13   © 2012 Protiviti Member Firm Kuwait W.L.L
     PUBLIC: 4th Kuwait Info Security Conference

Mais conteúdo relacionado

Semelhante a Mr. Khalid Shaikh - emerging trends in managing it security

Examples of Systance's interventions
Examples of Systance's interventionsExamples of Systance's interventions
Examples of Systance's interventionsBernard JOUVEL
 
GIS In Local Government Global Image
GIS In Local Government Global ImageGIS In Local Government Global Image
GIS In Local Government Global ImageGIS Global Image
 
Ppt si-03-eng
Ppt si-03-engPpt si-03-eng
Ppt si-03-engvalbasp
 
Appcelerator Mobile Development Platform
Appcelerator Mobile Development PlatformAppcelerator Mobile Development Platform
Appcelerator Mobile Development Platformrickross
 
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto PresentazioneViii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazioneguestd1ae161
 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsKim Escherich
 
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a realityEfficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a realityBSP Media Group
 
Ramon Montero's Presentation
Ramon Montero's PresentationRamon Montero's Presentation
Ramon Montero's Presentationguest41c26d
 
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom Thierry Lestable
 
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324Brochure ascen flow_en_110324
Brochure ascen flow_en_110324Galen Hsieh
 
Introduction To Xener Systems
Introduction To  Xener  SystemsIntroduction To  Xener  Systems
Introduction To Xener SystemsGuisun Han
 
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaEthernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaPuran Pangeni
 
Cloud Foundry Architecture and Overview
Cloud Foundry Architecture and OverviewCloud Foundry Architecture and Overview
Cloud Foundry Architecture and Overviewrajdeep
 
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri LankaAdoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri LankaWasantha Deshapriya
 
Document Management In Pharma
Document Management In PharmaDocument Management In Pharma
Document Management In Pharmadhiria00
 
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran DigitalDigital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran DigitalHeru Sutadi
 

Semelhante a Mr. Khalid Shaikh - emerging trends in managing it security (20)

Examples of Systance's interventions
Examples of Systance's interventionsExamples of Systance's interventions
Examples of Systance's interventions
 
GIS In Local Government Global Image
GIS In Local Government Global ImageGIS In Local Government Global Image
GIS In Local Government Global Image
 
Ppt si-03-eng
Ppt si-03-engPpt si-03-eng
Ppt si-03-eng
 
Appcelerator Mobile Development Platform
Appcelerator Mobile Development PlatformAppcelerator Mobile Development Platform
Appcelerator Mobile Development Platform
 
09 03
09 0309 03
09 03
 
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto PresentazioneViii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazione
 
5 isu and-wbs_tf-gusmeroli
5 isu and-wbs_tf-gusmeroli5 isu and-wbs_tf-gusmeroli
5 isu and-wbs_tf-gusmeroli
 
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of ThingsIT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
 
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a realityEfficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a reality
 
Ramon Montero's Presentation
Ramon Montero's PresentationRamon Montero's Presentation
Ramon Montero's Presentation
 
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom
 
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324Brochure ascen flow_en_110324
Brochure ascen flow_en_110324
 
Introduction To Xener Systems
Introduction To  Xener  SystemsIntroduction To  Xener  Systems
Introduction To Xener Systems
 
Net blazr at is4cwn
Net blazr at is4cwnNet blazr at is4cwn
Net blazr at is4cwn
 
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaEthernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
 
Cloud Foundry Architecture and Overview
Cloud Foundry Architecture and OverviewCloud Foundry Architecture and Overview
Cloud Foundry Architecture and Overview
 
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri LankaAdoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri Lanka
 
Document Management In Pharma
Document Management In PharmaDocument Management In Pharma
Document Management In Pharma
 
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran DigitalDigital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
 
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
 

Mais de nooralmousa

Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testingnooralmousa
 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovationsnooralmousa
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsnooralmousa
 
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for cisonooralmousa
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metricsnooralmousa
 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keysnooralmousa
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudnooralmousa
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 

Mais de nooralmousa (13)

Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
 
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Mr. Khalid Shaikh - emerging trends in managing it security

  • 1. Emerging Trends in Managing IT Security May 2012 Presentation by: Khalid Shaikh – Practice Head for IT Security and Privacy Services
  • 2. Changing Business Needs 1980 2000 2010 and beyond Internet Public Telephone Evolution Transformation Digital Set Top Customers Telephone, Third Telephone, Internet Third Internet Parties & Third Parties Parties & Third Parties Internet Third Internet Router Router Satellite dish Parties Lightpath ` ` Internet Internet Satellite dish Satellite dish Frame Optimum Cable Modem Relay Online Customers Optimum Oracle Online Optimum Untrusted Lightpath Corporate Cable Modem Corporate Cable Modem Customers Online Backbone Customers Backbone Customers Backbone Other Businesses and/or New Businesses Voice Voice Network Satellite dish Network Satellite dish Router Router Cable Frame Internet Relay Terminal Server PBX PBX Rainbow Media Lightpath Lightpath Digital Digital Set Top Set Top Customers Internet Employees & Customers Customers Third Parties Lightpath Public Satellite dish Lightpath Public Customers Telephone Customers Telephone 2 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 3. Emerging Technologies 3 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 4. Trends in IT Security Attack TREND 1 : Industrial Threats TREND 2 : Threats Within: Embedded Hardware TREND 3 : Hacktivism TREND 4 : Web Threats…. TREND 5 : Mobile Threats 4 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 5. Recent Events 5 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 6. Motives of Attack • Industrial Espionage • Financial • Military • Ideological • Politics • Prestige 6 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 7. Attack Tools are Freely Available 7 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 8. Security Never Sleeps • Increasing sophistications of attacks • Protect data and information • Keeping up-to-date with security incidents and solutions • Keeping the IT infrastructure in compliance with the IT Security Policy of the organization • Keeping up-to-date with the changes to legal and regulatory requirements • Reacting effectively and timely to security violations • Effectively managing threats to data security • Complexity of managing a broad portfolio of security tools/solutions • Mobile clients and unmanaged devices • Periodically conducting security awareness trainings to users within the organization 8 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 9. Holistic Approach in Managing IT Security Information Security Vision and Strategy Business Initiatives Threats Senior Management Commitment Best/Acceptable Practice Training and Awareness Enterprise Architecture Legislation Strategy Vulnerability & Risk Assessment Security Policy Security Architecture and Technical Standards Administrative and End-User Guidelines, Practices and Procedures Enforcement Monitoring Recovery Process Process Process Information Security Management 9 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 10. Holistic Approach in Managing IT Security 10 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 11. Prediction – Persistence – Patience - Preparedness 11 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 12. If You Have Further Questions: Please visit us at Booth Number 8 and 9. Khalid Shaikh Phone: (965) – 66225122 Senior Manager – Technology khalid.shaikh@protivitiglobal.com.kw Risk Services Powerful Insights. Proven Delivery.™ 12 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  • 13. 13 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference