Weitere ähnliche Inhalte
Ähnlich wie Mr. Khalid Shaikh - emerging trends in managing it security (20)
Mehr von nooralmousa (13)
Kürzlich hochgeladen (20)
Mr. Khalid Shaikh - emerging trends in managing it security
- 1. Emerging Trends in Managing
IT Security
May 2012
Presentation by: Khalid Shaikh – Practice Head for
IT Security and Privacy Services
- 2. Changing Business Needs
1980 2000 2010 and beyond
Internet Public
Telephone
Evolution Transformation Digital
Set Top
Customers
Telephone, Third Telephone, Internet
Third
Internet Parties & Third Parties
Parties
& Third Parties
Internet Third Internet Router
Router Satellite dish
Parties
Lightpath
` `
Internet Internet
Satellite dish
Satellite dish Frame Optimum Cable Modem
Relay Online Customers
Optimum
Oracle Online
Optimum Untrusted Lightpath
Corporate Cable Modem Corporate Cable Modem Customers
Online
Backbone Customers Backbone Customers Backbone Other Businesses
and/or
New Businesses
Voice Voice
Network Satellite dish Network Satellite dish
Router Router
Cable Frame
Internet Relay
Terminal Server
PBX PBX Rainbow Media
Lightpath Lightpath
Digital Digital
Set Top Set Top
Customers Internet Employees &
Customers Customers Third Parties
Lightpath Public Satellite dish
Lightpath Public
Customers Telephone Customers Telephone
2 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 4. Trends in IT Security Attack
TREND 1 : Industrial Threats
TREND 2 : Threats Within: Embedded Hardware
TREND 3 : Hacktivism
TREND 4 : Web Threats….
TREND 5 : Mobile Threats
4 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 5. Recent Events
5 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 6. Motives of Attack
• Industrial Espionage
• Financial
• Military
• Ideological
• Politics
• Prestige
6 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 7. Attack Tools are Freely Available
7 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 8. Security Never Sleeps
• Increasing sophistications of attacks
• Protect data and information
• Keeping up-to-date with security incidents and solutions
• Keeping the IT infrastructure in compliance with the IT Security Policy of the
organization
• Keeping up-to-date with the changes to legal and regulatory requirements
• Reacting effectively and timely to security violations
• Effectively managing threats to data security
• Complexity of managing a broad portfolio of security tools/solutions
• Mobile clients and unmanaged devices
• Periodically conducting security awareness trainings to users within the
organization
8 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 9. Holistic Approach in Managing IT Security
Information Security Vision and Strategy
Business Initiatives
Threats
Senior Management Commitment
Best/Acceptable
Practice
Training and Awareness
Enterprise Architecture Legislation
Strategy Vulnerability & Risk
Assessment
Security Policy
Security Architecture and Technical Standards
Administrative and End-User Guidelines, Practices and Procedures
Enforcement Monitoring Recovery
Process Process Process
Information Security Management
9 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 10. Holistic Approach in Managing IT Security
10 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 11. Prediction – Persistence – Patience - Preparedness
11 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 12. If You Have Further Questions: Please visit us
at Booth Number 8 and 9.
Khalid Shaikh Phone: (965) – 66225122
Senior Manager – Technology khalid.shaikh@protivitiglobal.com.kw
Risk Services
Powerful Insights. Proven Delivery.™
12 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference
- 13. 13 © 2012 Protiviti Member Firm Kuwait W.L.L
PUBLIC: 4th Kuwait Info Security Conference