SlideShare ist ein Scribd-Unternehmen logo
1 von 11
What’s Hot in Information
Security - 2012




Jared Carstensen SSCP, CISSP, CRISC, CCSK
Security & Forensics
Deloitte
jcarstensen@deloitte.ie
Hot Topics - 2011

Looking Back – What was featured for 2011

• Social Networking – increase in threats and online defamation
  cases
• Growth in e-Discovery cases and solutions
• Protecting data at the data layer (Wikileaks)– DLP tools
• Smart Phones and risks involved (iPhone proliferation)
• Malware for Cyber warfare (Stuxnet)
• Online transactions security (customer end point security)
• Virtualized environments – security implications
• Cloud Computing & security implications

Last year saw an unprecedented level of Data Breaches, Hacks,
and high profile security related incidents including Sony, RSA,
Epsilon, TripAdvisor, United Nations etc.
2   What's Hot in Information Security - 2012             © 2012 Deloitte & Touche
Hot Topics - 2012

Looking Forward – What lies ahead for 2012

•   Cloud Security
•   Cyber Warfare and Cyber Security initiatives
•   End to End eDiscovery
•   iPhones / iPads / Smart devices Security
•   Advanced Persistent Threats




3   What's Hot in Information Security - 2012      © 2012 Deloitte & Touche
Cloud Security – Here to Stay

Cloud Security will remain a hotly debated and dominant feature in
2012. With Cloud adoption continuing to increase both here in
Ireland and Internationally, the following elements will continue to
feature:

•   Abuse and Nefarious Use of Cloud Computing
•   Malicious Insiders
•   Shared Technology Issues
•   Data Loss or Leakage
•   Account or Service Hijacking
•   Unknown Risk Profile
•   Compliance (Privacy / Data Protection)
•   Governance & Risks Elements



4   What's Hot in Information Security - 2012               © 2012 Deloitte & Touche
Cyber Warfare & Cyber Security

Cyber attacks and Cyber threats have been a constant threat to both
national infrastructure and businesses alike over the past 24-36
months with a startling number of increases in attacks.
Internationally, protecting national infrastructure and core
government systems from cyber threats is a key strategic priority,
with cyber attacks identified as a top tier risk over the next five
years.
Governments, Multinationals, Utilities,
Financial Services, Energy, and
Services organisation are currently
focussing efforts and resources to
secure and safeguard critical assets.

*Department of Justice & Finance
Website attacks on 24/01/2011
5   What's Hot in Information Security - 2012               © 2012 Deloitte & Touche
eDiscovery & Digital Forensics

“If you recorded all human communication from the dawn of time to
2003, it would take up about five billion gigabytes of storage space.
Now we’re creating that much data every two days.”
                                                                  ~Eric Schmidt [Google]


• Current Economic Conditions will continue to increase the number
  of civil litigation cases involving digital data
                                                • Digital investigations (Forensics)
                                                  will assist the growing number of
                                                  cases both internal to
                                                  organisations and externally.
                                                • Cloud Computing may be the
                                                  “forgotten” element introducing
                                                  additional complexity and
                                                  challenges for investigations
6   What's Hot in Information Security - 2012                                © 2012 Deloitte & Touche
iPhones / iPads / Smart devices Security

Increasing Requirement for Seniors / Board Members to have
iPhones / iPads / Smart Devices. Some of the challenges from a
security perspective include:
• Limited authentication / encryption / audit / logging
• Very limited number of security control options
• No granularity in application policies (either on/off)
• No centralised management
• Cannot push new policies over the air on demand
• Weak encryption protection if device is stolen
• Sensitive data susceptible to jailbreak attacks


7   What's Hot in Information Security - 2012              © 2012 Deloitte & Touche
Convergence of mobile devices and the corporate environment leads to new
risks that must be addressed


           • Unencrypted data
           • Missing screen-lock                                                         • Software installed via
           • Insecure PINs                                                                 scam mails
                                                    Compromise                           • Remote exploitable
                                                     Local Data                            vulnerabilities
                                                    with Physical
                                                       Access
• Against users
• Against third                                                        Compromise
                                                                        Local Data
  parties                   Liability Risks
                                                                       with Remote
                                                                         Access




                                                      Risk                                     • Mobile Device is
• Data Protection                             associated to mobile
                                                    devices                   Unauthorised
                                                                                                 used as an entry
• Telecommuni-          Legal and Non
                                                                              Access to the      point for the
                         Compliance
  cations Law               Risks
                                                                               Corporate         corporate network
• Company                                                                       Network
  Policy


• Disables protection                   Jailbreaking,
                                                                Malware and              • Apps containing
                                                                compromised
  measures on signed                     Rooting, …                                        malicious code used for
                                                                   Apps
  apps                                                                                     attacks against the user
• Increased attack                                                                         or the corporate network
  vector
                                                                                                 © 2008 Deloitte Touche Tohmatsu
Advanced Persistent Threats (APT’s)

Conventional hacker or cybercriminals have been around for quite some time.
They tend to operate on a hit ratio or successful outcome basis – they tend not to
be solely focussed on any particular target. They may want a thousand credit card
numbers for fraud, or to break into an account and turn it into a zombie, or for
other associated uses.

APT attackers are:
• Attackers who are focussed and set on attacking you or a specific target!
• It doesn't matter how secure you think you are! All that matters is whether
  you're secure enough to keep them out.
• APT attackers are more highly motivated – there is a motive or reason they are
  targeting an entity or company.
• They're likely to be better skilled, better funded, and more patient (there is
  typically no “end date”).
• They're likely to try several different avenues of attack. And they're much more
  likely to succeed.


9   What's Hot in Information Security - 2012                             © 2012 Deloitte & Touche
Questions?




10   What's Hot in Information Security - 2012   © 2012 Deloitte & Touche
THANK YOU

Jared Carstensen SSCP, CISSP, CRISC, CCSK
Security & Forensics
jcarstensen@deloitte.ie
086 322 8004



Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a private company limited by guarantee, and its network of member
firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/ie/about for a detailed description of the legal
structure of Deloitte Touche Tohmatsu Limited and its member firms.

Deloitte’s 1,200 people in Dublin, Cork and Limerick provide audit, tax, consulting, and corporate finance to public and private clients
spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class
capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges.
Deloitte’s approximately 182,000 professionals are committed to becoming the standard of excellence.

This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, Deloitte Global Services Limited, Deloitte
Global Services Holdings Limited, the Deloitte Touche Tohmatsu Verein, any of their member firms, or any of the foregoing’s affiliates
(collectively the “Deloitte Network”) are, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or
other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a
basis for any decision or action that may affect your finances or your business. Before making any decision or taking any action that may
affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be
responsible for any loss whatsoever sustained by any person who relies on this publication.

© 2012 Deloitte & Touche. All rights reserved

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Kürzlich hochgeladen (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Information Security - Whats hot for 2012 - Jared Carstensen

  • 1. What’s Hot in Information Security - 2012 Jared Carstensen SSCP, CISSP, CRISC, CCSK Security & Forensics Deloitte jcarstensen@deloitte.ie
  • 2. Hot Topics - 2011 Looking Back – What was featured for 2011 • Social Networking – increase in threats and online defamation cases • Growth in e-Discovery cases and solutions • Protecting data at the data layer (Wikileaks)– DLP tools • Smart Phones and risks involved (iPhone proliferation) • Malware for Cyber warfare (Stuxnet) • Online transactions security (customer end point security) • Virtualized environments – security implications • Cloud Computing & security implications Last year saw an unprecedented level of Data Breaches, Hacks, and high profile security related incidents including Sony, RSA, Epsilon, TripAdvisor, United Nations etc. 2 What's Hot in Information Security - 2012 © 2012 Deloitte & Touche
  • 3. Hot Topics - 2012 Looking Forward – What lies ahead for 2012 • Cloud Security • Cyber Warfare and Cyber Security initiatives • End to End eDiscovery • iPhones / iPads / Smart devices Security • Advanced Persistent Threats 3 What's Hot in Information Security - 2012 © 2012 Deloitte & Touche
  • 4. Cloud Security – Here to Stay Cloud Security will remain a hotly debated and dominant feature in 2012. With Cloud adoption continuing to increase both here in Ireland and Internationally, the following elements will continue to feature: • Abuse and Nefarious Use of Cloud Computing • Malicious Insiders • Shared Technology Issues • Data Loss or Leakage • Account or Service Hijacking • Unknown Risk Profile • Compliance (Privacy / Data Protection) • Governance & Risks Elements 4 What's Hot in Information Security - 2012 © 2012 Deloitte & Touche
  • 5. Cyber Warfare & Cyber Security Cyber attacks and Cyber threats have been a constant threat to both national infrastructure and businesses alike over the past 24-36 months with a startling number of increases in attacks. Internationally, protecting national infrastructure and core government systems from cyber threats is a key strategic priority, with cyber attacks identified as a top tier risk over the next five years. Governments, Multinationals, Utilities, Financial Services, Energy, and Services organisation are currently focussing efforts and resources to secure and safeguard critical assets. *Department of Justice & Finance Website attacks on 24/01/2011 5 What's Hot in Information Security - 2012 © 2012 Deloitte & Touche
  • 6. eDiscovery & Digital Forensics “If you recorded all human communication from the dawn of time to 2003, it would take up about five billion gigabytes of storage space. Now we’re creating that much data every two days.” ~Eric Schmidt [Google] • Current Economic Conditions will continue to increase the number of civil litigation cases involving digital data • Digital investigations (Forensics) will assist the growing number of cases both internal to organisations and externally. • Cloud Computing may be the “forgotten” element introducing additional complexity and challenges for investigations 6 What's Hot in Information Security - 2012 © 2012 Deloitte & Touche
  • 7. iPhones / iPads / Smart devices Security Increasing Requirement for Seniors / Board Members to have iPhones / iPads / Smart Devices. Some of the challenges from a security perspective include: • Limited authentication / encryption / audit / logging • Very limited number of security control options • No granularity in application policies (either on/off) • No centralised management • Cannot push new policies over the air on demand • Weak encryption protection if device is stolen • Sensitive data susceptible to jailbreak attacks 7 What's Hot in Information Security - 2012 © 2012 Deloitte & Touche
  • 8. Convergence of mobile devices and the corporate environment leads to new risks that must be addressed • Unencrypted data • Missing screen-lock • Software installed via • Insecure PINs scam mails Compromise • Remote exploitable Local Data vulnerabilities with Physical Access • Against users • Against third Compromise Local Data parties Liability Risks with Remote Access Risk • Mobile Device is • Data Protection associated to mobile devices Unauthorised used as an entry • Telecommuni- Legal and Non Access to the point for the Compliance cations Law Risks Corporate corporate network • Company Network Policy • Disables protection Jailbreaking, Malware and • Apps containing compromised measures on signed Rooting, … malicious code used for Apps apps attacks against the user • Increased attack or the corporate network vector © 2008 Deloitte Touche Tohmatsu
  • 9. Advanced Persistent Threats (APT’s) Conventional hacker or cybercriminals have been around for quite some time. They tend to operate on a hit ratio or successful outcome basis – they tend not to be solely focussed on any particular target. They may want a thousand credit card numbers for fraud, or to break into an account and turn it into a zombie, or for other associated uses. APT attackers are: • Attackers who are focussed and set on attacking you or a specific target! • It doesn't matter how secure you think you are! All that matters is whether you're secure enough to keep them out. • APT attackers are more highly motivated – there is a motive or reason they are targeting an entity or company. • They're likely to be better skilled, better funded, and more patient (there is typically no “end date”). • They're likely to try several different avenues of attack. And they're much more likely to succeed. 9 What's Hot in Information Security - 2012 © 2012 Deloitte & Touche
  • 10. Questions? 10 What's Hot in Information Security - 2012 © 2012 Deloitte & Touche
  • 11. THANK YOU Jared Carstensen SSCP, CISSP, CRISC, CCSK Security & Forensics jcarstensen@deloitte.ie 086 322 8004 Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/ie/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte’s 1,200 people in Dublin, Cork and Limerick provide audit, tax, consulting, and corporate finance to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte’s approximately 182,000 professionals are committed to becoming the standard of excellence. This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, Deloitte Global Services Limited, Deloitte Global Services Holdings Limited, the Deloitte Touche Tohmatsu Verein, any of their member firms, or any of the foregoing’s affiliates (collectively the “Deloitte Network”) are, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your finances or your business. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this publication. © 2012 Deloitte & Touche. All rights reserved