SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Top Security Trends and Takeaways for 2013
March 2013
2
Agenda
 The Coming Together of Cloud and Mobility
 IT Embedded Across Industries
 IT Security Market Evolution
 Social Media and Consumerisation
 Cloud and Mobile Threats
3
The Coming Together of Computing and Mobility
1970s1960s 1980s 1990s 2000
Mainframe
Supercomputer
2010
Cloud
Smart Phones
&
Tablets
Personal
Computer
Laptop/
Notebook
Mobile
Phone
(2G)
4
Mobile Ahead as Means of Connecting to the Internet
4
Source: Statcounter Global Stats, KPCB
5
Bandwidth Requirements
Emails
Internet
browsing
Social Networking
Online
Shopping
P2P File
Sharing
Real time Communications
Smart City Infrastructure
Tele-medicine
Connected Cars
Tele-education
Smart Grids
Next Generation TV
M2M
Application/ContentRequirements
< 1Mbps 3 - 7 Mbps 100 Mbps - 1 Gbps
Rich Communications o Increasing demand from consumers
for virtual equivalent communication
and entertainment experiences. For
example, low latency in high graphics
gaming.
o Demand from enterprises (e.g. SMEs)
for cost effective productivity
applications such as cloud computing.
o Demand from the public sector to
increase administrative efficiency via
smart city infrastructure.
NBN: Possibilities
ConvergenceBasic
Cloud Computing
High Speed Networks and Convergence
6
Example: Self-Driving Automobiles
• Google has been working on this for four years
now.
• Automobile manufacturers are also
researching including GM, BMW and Audi
• February 2012 – Nevada passes first laws in
the USA to allow driverless cars on its
highways.
• General Motors predicts the technology will
be standard by 2020.
Convergence of different industries? Security
Implications?
7
‘Virtual’ World Security Issues Massively Impacting
‘Physical’ World
South Korea
Steps Up
Security at
Nuclear Plants
8
1985-1995 1995-2005 2005-2015 2015 Onwards
Source: Frost & Sullivan.
Maladvertising
,Ransonware
PC Viruses
Spam
Internet
Viruses
Phishing,
Bots,
Spyware
DDOS,
Worms,
Trojans
Social Media,
Mobile, Cloud,
APTs Watering
holes
Impact
Cyber-
everything,
Threat Evolution and Impact
9
1,979.4
2,205.6
2,448.6
2,716.7
3,015.3
1,413.9
1,600.5
1,972.1
2,390.0
2,881.9
570.6
664.3
785.4
936.3
1,120.0
112.9 140.5 181.0 242.7 313.1
78.5 103.1 136.9 184.5 254.0
48.4 70.4 105.7 162.3
252.2
57.8 84.9 121.6 169.1 207.9
21.9 30.2 51.3 69.5 89.2
0.0
500.0
1,000.0
1,500.0
2,000.0
2,500.0
3,000.0
3,500.0
2011 2012 2013 2014 2015
Network Security
CAGR (2012-2015):
11.0%
MSS
CAGR (2012-2015):
21.7%
SCM
CAGR (2012-2015):
19.0%
SIEM
CAGR (2012-2015):
30.6%
WAF
CAGR (2012-2015):
35.0%
Virtualization Security
CAGR (2012-2015):
53.0%
DLP
CAGR (2012-2015):
34.8%
Mobile Security
CAGR (2012-2015):
43.5%
TotalRevenue(US$
Million)Security Market Size and Forecast
10
Social Media is now a Key Part of Customer Experience
Customers are
discussing your
products/services
Customers are sharing experiences online
Social Media gives you the ability to listen to customers,
even when they are not calling you
Social Media has the power to significantly impact your
business, so ignoring this channel is no longer an option
11
Social Media becomes Preferred Platform for Malware
• Social media is becoming the
most attractive platform for
malware as mobile devices
become the most attractive
hardware
• Young people are often very
susceptible to social media
scams as they are often less
cautious about sharing personal
information
• Spam and phishing is shifting to
social media platforms
12
Public
Domain
Personal
Domain
Professional
Domain
What the Individual wants:
 Persona Integration
 Single Device Mentality
 Freedom of Choice
Conflict Theatre – The Human Factor
What the Enterprise wants:
 Persona Differentiation
 Visibility into User Behaviors
 Power of Control
Public
Domain
Professiona
l Domain
Personal
Domain
Source: Frost & Sullivan
13
3.6
3.83.8
4.1
4.2
2.0
3.0
4.0
5.0
CostService Level
Agreement (SLA)
Service OfferingsUptime and
Reliability
Concerns
Security & Data
Privacy Concern
How would you rate the level of impact that the following factors have in your decision
making when it comes to cloud services in general?
MeanScore
APAC End-User Study – Adopting Cloud Services
N = 210.
Source: Frost & Sullivan
14
Mobile Security Revenue Forecast
-20.0
-10.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
90.0
100.0
2011 2012 2013 2014 2015
Revenue 21.9 30.2 51.3 69.5 89.2
Growth Rate 37.9 69.9 35.5 28.3
Revenue($Million)
Mobile Security Market: Revenue Forecast
APAC, 2012–2015
CAGR = 43.5%
-
GrowthRate
(%)
Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
15
Android: A Mecca for Malware
• OS fragmentation – mobile carriers not pushing updates aggressively enough.
Google controlled Nexus 4 is much more secure.
• Exposed source code and dominant mobile platform.
• Source of malware is often apps e.g, fake Instagram and fake Angry Birds that
send messages to premium rate SMS services.
• Linux based code is familiar territory for many hackers
• Will Google and the carriers respond?
16
Conclusions
• IT security is now having a profound effect on the „physical world‟.
• Embedded IT is massively increasing the potential impact
• Cloud, mobile and social are driving new security threats
• Cyberespionage and cybersabotage are becoming a reality. – more state
sponsored cyber attacks
• “Just as nuclear was the strategic warfare of the industrial era, cyber warfare
has become the strategic warfare of the information era” US Secretary of
Defence, Leon Panetta.
17
Thank You
For further questions and enquiries
Andrew Milroy
Vice President - ICT
Frost & Sullivan
Email: andrew.milroy@frost.com
Twitter: andy1994

Weitere ähnliche Inhalte

Was ist angesagt?

An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)
Dan Mo
 

Was ist angesagt? (20)

The Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTsThe Fight for Dominance; RCS vsOTTs
The Fight for Dominance; RCS vsOTTs
 
Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)Exciting Trends (2010 to 2020)
Exciting Trends (2010 to 2020)
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
Technology Trends 2016 Part I
Technology Trends 2016 Part ITechnology Trends 2016 Part I
Technology Trends 2016 Part I
 
Enforcing accountability in media using blockchain
Enforcing accountability in media using blockchainEnforcing accountability in media using blockchain
Enforcing accountability in media using blockchain
 
Telecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launchTelecom market growth awaits 5 g launch
Telecom market growth awaits 5 g launch
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Future of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomyFuture of Telecom - from automation to atonomy
Future of Telecom - from automation to atonomy
 
The mobile economy_2013
The mobile economy_2013The mobile economy_2013
The mobile economy_2013
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)An Overview on Internet of Things (IOT)
An Overview on Internet of Things (IOT)
 
Mobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunitiesMobile, video, gaming convergence brings opportunities
Mobile, video, gaming convergence brings opportunities
 
Mobile Monday on FreSh
Mobile Monday on FreShMobile Monday on FreSh
Mobile Monday on FreSh
 
20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1 20130916 mobtzu ddma mobilewave v1.1
20130916 mobtzu ddma mobilewave v1.1
 
2014 Fortune 500 infographic
2014 Fortune 500 infographic2014 Fortune 500 infographic
2014 Fortune 500 infographic
 
Internet of Things Facts and Stats
Internet of Things Facts and StatsInternet of Things Facts and Stats
Internet of Things Facts and Stats
 
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
 The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic... The 5 g wireless ecosystem: 2016   2030 - technologies, applications, vertic...
The 5 g wireless ecosystem: 2016 2030 - technologies, applications, vertic...
 

Ähnlich wie andrew milroy - top security trends and takeaways for 2013

VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power Point
Felipe Lamus
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Oscar Romano
 

Ähnlich wie andrew milroy - top security trends and takeaways for 2013 (20)

2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)
 
Ltb2014 digital deployment as a competitive advantage-shaun collins
Ltb2014   digital deployment as a competitive advantage-shaun collinsLtb2014   digital deployment as a competitive advantage-shaun collins
Ltb2014 digital deployment as a competitive advantage-shaun collins
 
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
Internet of Things Market | Internet Industry Report | Forecasts 2015-2021
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power Point
 
Telecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyondTelecommunication trends in 2013 and beyond
Telecommunication trends in 2013 and beyond
 
Foro Empresarial PerĂş 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial PerĂş 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial PerĂş 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial PerĂş 2017 - Tendencias impactando Ciudades & Negocios
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013 Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
Пол Джейкобс, CEO Qualcomm о новых технологиях на IQ2013
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
A Mobile First Future
A Mobile First FutureA Mobile First Future
A Mobile First Future
 
Ash Dahod Mobile Data Deluge
Ash Dahod Mobile Data DelugeAsh Dahod Mobile Data Deluge
Ash Dahod Mobile Data Deluge
 
Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit Bill Barney's Key Note at the Wan Summit
Bill Barney's Key Note at the Wan Summit
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)
 
Technology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforceTechnology Trends / AEC 2015 shaping IT workforce
Technology Trends / AEC 2015 shaping IT workforce
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosion
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
 

Mehr von Graeme Wood

AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721
Graeme Wood
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Graeme Wood
 
Raimund genes from traditional malware to targeted attacks
Raimund genes    from traditional malware to targeted attacksRaimund genes    from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
Graeme Wood
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Graeme Wood
 

Mehr von Graeme Wood (15)

TechCatalyst free assessment
TechCatalyst free assessment TechCatalyst free assessment
TechCatalyst free assessment
 
TechCatalyst Corporate Overview
TechCatalyst Corporate Overview TechCatalyst Corporate Overview
TechCatalyst Corporate Overview
 
How does semantic technology work?
How does semantic technology work? How does semantic technology work?
How does semantic technology work?
 
AI and the Financial Service Segment
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service Segment
 
Ai and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewAi and Legal Industy - Executive Overview
Ai and Legal Industy - Executive Overview
 
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing
 
Introduction to Semantic Computing
Introduction to Semantic ComputingIntroduction to Semantic Computing
Introduction to Semantic Computing
 
AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Raimund genes from traditional malware to targeted attacks
Raimund genes    from traditional malware to targeted attacksRaimund genes    from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010
 
Anz cloud thought leadership 16 mar
Anz cloud thought leadership 16 marAnz cloud thought leadership 16 mar
Anz cloud thought leadership 16 mar
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 

KĂźrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

KĂźrzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

andrew milroy - top security trends and takeaways for 2013

  • 1. Top Security Trends and Takeaways for 2013 March 2013
  • 2. 2 Agenda  The Coming Together of Cloud and Mobility  IT Embedded Across Industries  IT Security Market Evolution  Social Media and Consumerisation  Cloud and Mobile Threats
  • 3. 3 The Coming Together of Computing and Mobility 1970s1960s 1980s 1990s 2000 Mainframe Supercomputer 2010 Cloud Smart Phones & Tablets Personal Computer Laptop/ Notebook Mobile Phone (2G)
  • 4. 4 Mobile Ahead as Means of Connecting to the Internet 4 Source: Statcounter Global Stats, KPCB
  • 5. 5 Bandwidth Requirements Emails Internet browsing Social Networking Online Shopping P2P File Sharing Real time Communications Smart City Infrastructure Tele-medicine Connected Cars Tele-education Smart Grids Next Generation TV M2M Application/ContentRequirements < 1Mbps 3 - 7 Mbps 100 Mbps - 1 Gbps Rich Communications o Increasing demand from consumers for virtual equivalent communication and entertainment experiences. For example, low latency in high graphics gaming. o Demand from enterprises (e.g. SMEs) for cost effective productivity applications such as cloud computing. o Demand from the public sector to increase administrative efficiency via smart city infrastructure. NBN: Possibilities ConvergenceBasic Cloud Computing High Speed Networks and Convergence
  • 6. 6 Example: Self-Driving Automobiles • Google has been working on this for four years now. • Automobile manufacturers are also researching including GM, BMW and Audi • February 2012 – Nevada passes first laws in the USA to allow driverless cars on its highways. • General Motors predicts the technology will be standard by 2020. Convergence of different industries? Security Implications?
  • 7. 7 ‘Virtual’ World Security Issues Massively Impacting ‘Physical’ World South Korea Steps Up Security at Nuclear Plants
  • 8. 8 1985-1995 1995-2005 2005-2015 2015 Onwards Source: Frost & Sullivan. Maladvertising ,Ransonware PC Viruses Spam Internet Viruses Phishing, Bots, Spyware DDOS, Worms, Trojans Social Media, Mobile, Cloud, APTs Watering holes Impact Cyber- everything, Threat Evolution and Impact
  • 9. 9 1,979.4 2,205.6 2,448.6 2,716.7 3,015.3 1,413.9 1,600.5 1,972.1 2,390.0 2,881.9 570.6 664.3 785.4 936.3 1,120.0 112.9 140.5 181.0 242.7 313.1 78.5 103.1 136.9 184.5 254.0 48.4 70.4 105.7 162.3 252.2 57.8 84.9 121.6 169.1 207.9 21.9 30.2 51.3 69.5 89.2 0.0 500.0 1,000.0 1,500.0 2,000.0 2,500.0 3,000.0 3,500.0 2011 2012 2013 2014 2015 Network Security CAGR (2012-2015): 11.0% MSS CAGR (2012-2015): 21.7% SCM CAGR (2012-2015): 19.0% SIEM CAGR (2012-2015): 30.6% WAF CAGR (2012-2015): 35.0% Virtualization Security CAGR (2012-2015): 53.0% DLP CAGR (2012-2015): 34.8% Mobile Security CAGR (2012-2015): 43.5% TotalRevenue(US$ Million)Security Market Size and Forecast
  • 10. 10 Social Media is now a Key Part of Customer Experience Customers are discussing your products/services Customers are sharing experiences online Social Media gives you the ability to listen to customers, even when they are not calling you Social Media has the power to significantly impact your business, so ignoring this channel is no longer an option
  • 11. 11 Social Media becomes Preferred Platform for Malware • Social media is becoming the most attractive platform for malware as mobile devices become the most attractive hardware • Young people are often very susceptible to social media scams as they are often less cautious about sharing personal information • Spam and phishing is shifting to social media platforms
  • 12. 12 Public Domain Personal Domain Professional Domain What the Individual wants:  Persona Integration  Single Device Mentality  Freedom of Choice Conflict Theatre – The Human Factor What the Enterprise wants:  Persona Differentiation  Visibility into User Behaviors  Power of Control Public Domain Professiona l Domain Personal Domain Source: Frost & Sullivan
  • 13. 13 3.6 3.83.8 4.1 4.2 2.0 3.0 4.0 5.0 CostService Level Agreement (SLA) Service OfferingsUptime and Reliability Concerns Security & Data Privacy Concern How would you rate the level of impact that the following factors have in your decision making when it comes to cloud services in general? MeanScore APAC End-User Study – Adopting Cloud Services N = 210. Source: Frost & Sullivan
  • 14. 14 Mobile Security Revenue Forecast -20.0 -10.0 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 80.0 90.0 100.0 2011 2012 2013 2014 2015 Revenue 21.9 30.2 51.3 69.5 89.2 Growth Rate 37.9 69.9 35.5 28.3 Revenue($Million) Mobile Security Market: Revenue Forecast APAC, 2012–2015 CAGR = 43.5% - GrowthRate (%) Note: All figures are rounded. The base year is 2012. Source: Frost & Sullivan analysis.
  • 15. 15 Android: A Mecca for Malware • OS fragmentation – mobile carriers not pushing updates aggressively enough. Google controlled Nexus 4 is much more secure. • Exposed source code and dominant mobile platform. • Source of malware is often apps e.g, fake Instagram and fake Angry Birds that send messages to premium rate SMS services. • Linux based code is familiar territory for many hackers • Will Google and the carriers respond?
  • 16. 16 Conclusions • IT security is now having a profound effect on the „physical world‟. • Embedded IT is massively increasing the potential impact • Cloud, mobile and social are driving new security threats • Cyberespionage and cybersabotage are becoming a reality. – more state sponsored cyber attacks • “Just as nuclear was the strategic warfare of the industrial era, cyber warfare has become the strategic warfare of the information era” US Secretary of Defence, Leon Panetta.
  • 17. 17 Thank You For further questions and enquiries Andrew Milroy Vice President - ICT Frost & Sullivan Email: andrew.milroy@frost.com Twitter: andy1994