SlideShare a Scribd company logo
1 of 37
2015: Examining the
threatscape for the
year ahead
Stephen Cobb, CISSP
Senior Security Researcher
Todayā€™s topic
ā€¢ What cyber threats will your business
face in 2015?
ā€¢ From cyber criminals to nation states
and hacktivists, threats are evolving
ā€¢ What should you be doing now?
ā€¢ The best use of resources to protect
your business
The agenda
ā€¢ Defining moments of 2015
ā€¢ Lessons for 2015
ā€¢ Threats and responses
ā€¢ Strategies for success
Q1: Which 2014 security news
story concerns you the most?
ā€¢ Sony Pictures hacks
ā€¢ JPMorgan Chase breach
ā€¢ PSN DDoS attack
ā€¢ Community Health Systems breach
ā€¢ None of the above
Defining moments: Sony+
ā€¢ Last year it was Snowden/Target
ā€¢ This year itā€™s Sony
ā€¢ Also maybe JP Morgan Chase
ā€¢ With a touch of The Home Depot
ā€¢ Plus The Home of a Despot
ā€¢ Some politics and NSA
ā€¢ And a sprinkle of IoT
Defining moments
ā€¢ Are teaching moments
ā€¢ If we donā€™t learn from 2014
ā€¢ 2015 wonā€™t be
any better
Sony Pictures epic hack
ā€¢ Data destroyed, stolen, exposed
ā€¢ System availability denied/degraded
ā€¢ Present and former employees
personally impacted
ā€¢ Lawsuits
ā€¢ Brand damage
Systemic security failure?
ā€¢ A history of being attacked
ā€¢ A ā€œlive with the risk attitudeā€
ā€¢ Known weaknesses not remedied
ā€¢ PWC audit second half of July
ā€“ One firewall and more than 100 other devices
not monitored by corporate security team
ā€“ Monitored by studioā€™s in-house group
ā€“ "Security incidents impacting these network or
infrastructure devices may not be detected or
resolved timely"
Lesson #1
ā€¢ Donā€™t leave unencrypted audit reports in
executive email inboxes
ā€¢ Donā€™t put into unencrypted email anything
you may later regret saying or sharing
(words, images, reports, etc.)
ā€¢ Most email is unencrypted
ā€¢ If they own your account, encryption is
not going to keep secrets
Lesson #2
ā€¢ Make your security awesome before
you antagonize known hackers
ā€¢ Or donā€™t antagonize known hackers
ā€¢ Try asking your head of security if
heā€™s okay with you taunting hackers
ā€¢ If he says yes, get a second opinion
Lesson #3
ā€¢ Hacktivism is here
to stay
ā€¢ The Internet is
fundamentally
asymmetric
ā€¢ May discretion be
the better part of
cyber valor?
JPMorgan Chase hack
ā€¢ Deeper and wider than first announced
ā€¢ ā€œThis was a sophisticated attack with
nation state overtonesā€
Lesson #4
ā€¢ Do all the right things all the time
ā€¢ Yes, I know that is very hard to do
ā€¢ But the scale of targeted attack
activity is higher than ever
ā€¢ E.g. fewer cyber attacks on retailers,
but more efficient*
*IBM 2014 Retail Intelligence Report
Lesson #5
ā€¢ Donā€™t play the ā€œsophisticated nation
state attackā€ card
ā€¢ It makes you look bad later
ā€¢ Both JPMorgan and Sony Pictures
have tried this
ā€¢ Why? Lays groundwork for legal
defense against negligence claims*
The Home Depot et al.
ā€¢ Point of sale hacking continues, plus
SQL injection attacks on retailers
ā€¢ Look for more of the same, even as
chip cards start to take over
ā€¢ Transition period may offer points of
entry for hackers
ā€¢ Card data still useful for online fraud
Q2: Chip cards are coming and
they are hard to fake, so the
people who now make money
from card fraud will:
ā€¢ Get jobs
ā€¢ Try a different kind of fraud
Lesson #6
ā€¢ Crime displacement
ā€¢ EMV technology will make it harder
to turn stolen payment card data into
fake cards
ā€¢ The people who buy card data to
make fake cards will turn to other
forms of crime: Identity theft?
Tax ID fraud
ā€¢ Cost taxpayers $5 billion in 2013
ā€¢ Will be big in 2015
ā€¢ An easy alternative to card fraud
ā€¢ IRS needs to do more, but congress
cut the IRS budget
ā€¢ File early with fingers crossed
ā€¢ Takes 9 months to correct (average)
Some politics and NSA
ā€¢ NSA court cases and legislation will
keep privacy top of mind for many
ā€¢ Political stalemate and lack of trust
will hamper efforts to:
ā€“ Share data between .gov and .com
ā€“ Boost spending on cybercrime
deterrence
And a sprinkle of IoT
ā€¢ The Internet of Things will continue
to grow and get hacked
ā€¢ Security threat to organizations still
low relative to BYOD
ā€¢ Except in sectors that use SCADA
ā€¢ Privacy and rights issues may
emerge re: webcams, company
monitoring of IoT devices
Lesson #7
ā€¢ Threatscape is wider than ever
ā€¢ Cyber Crime, Inc. continues to dominate
ā€“ Data about people = money
ā€¢ Nation state hacking
ā€“ From secret sauce to state secrets
ā€¢ The resurgence of hacktivism
ā€¢ All of the traditional IT security risks
ā€“ Current and former employees, competitors,
natural/human disasters (stormy weather?)
Wildcards
ā€¢ New forms of payment and currency:
ā€“ Apple Pay and other digital wallets
ā€“ Bitcoin and other virtual currencies
ā€¢ Regional conflicts
ā€¢ The weather
Q3: A disaster puts your offices
and computer off limits for 3
days. Are you:
ā€¢ Well prepared with a written plan
ready to execute
ā€¢ Somewhat prepared
ā€¢ Not clear on how you would cope
ā€¢ In deep trouble
Security strategies: BCM/IR
ā€¢ Business Continuity Management and
Incident Response meansā€¦
ā€¢ Preparing to respond to:
ā€“ Security breaches, data theft
ā€“ Privacy incidents, internal fraud
ā€“ Extreme weather, man-made disasters
ā€¢ At all levels:
ā€“ Communications, people, processes, data
and systems, recovery, analysis
Security strategies: Backup
ā€¢ The ultimate protection against
ā€“ Data loss and data ransom
ā€“ User error and system failure
ā€“ Natural and man-made disasters
ā€¢ Review current strategies and test
current implementations
ā€¢ Consider all options (cloud, physical)
Strategies: Encryption
ā€¢ Time to do more encryption, not less
ā€¢ Encryption products have improved
ā€¢ Offer protection in case of breach
ā€¢ Encrypt in transit as well as at rest
ā€¢ Check your cloud providerā€™s use of
encryption e.g. between data centers
Strategies: Policy/compliance
ā€¢ Start of the new year is a good time
to check:
ā€¢ Are your information security policies
complete and up-to-date
ā€“ New technologies, new data, new hires
ā€¢ Are you aware of new laws affecting
your compliance around privacy,
data protection?
Strategies for success
ā€¢ Are you responsible for protecting
data and systems?
ā€¢ Donā€™t panic, you are not alone
ā€¢ Leverage heightened awareness
(courtesy Snowden-Target-
HomeDepot-Sony-JPMorgan)
ā€¢ Take a structured approach
You are not alone
ā€¢ Network with others, across
departments up/down the org chart
ā€¢ Within and beyond the organization
ā€¢ Chamber, BBB, SBA
ā€¢ ISSA, ISACA, (ISC)2, IAPP
ā€¢ ISACs, InfraGard, NCSA, VB
ā€¢ NIST, SOeC
IT Security and Privacy Groups
ā€¢ See attachments
ā€¢ Get involved
Revisit roadblocks
ā€¢ In 2015 the public and press will be
on high alert re: privacy and security
ā€¢ Bosses may not ā€œlikeā€ security but
breaches = lost customers, lost
revenue, lost jobs
ā€¢ Employees make be more interested
in security than you think
If all else fails try fear of headlines
Last word: Due care
ā€¢ Remember: complying with rules &
regulations (e.g. PCI, HIPAA, SOX)
is not the same as being secure
ā€¢ Your security will be judged in the
courts: media, public opinion, law
ā€¢ Liability under law hinges on
reasonableness, due care
Thank you! Have a safer 2015!
ā€¢ stephen.cobb@eset.com
ā€¢ WeLiveSecurity.com
ā€¢ www.eset.com
ā€¢ www.slideshare.net/zcobb

More Related Content

What's hot

The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexKanishka Ramyar
Ā 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
Ā 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
Ā 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
Ā 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
Ā 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessAde Ismail Isnan
Ā 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
Ā 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
Ā 
Cyber Security Landscape and Systems Resiliency ā€“ Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency ā€“ Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency ā€“ Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency ā€“ Challenges & Priorities - T...Knowledge Group
Ā 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
Ā 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsBryan Len
Ā 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
Ā 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
Ā 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain SecurityICSA, LLC
Ā 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
Ā 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
Ā 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
Ā 

What's hot (20)

The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
Ā 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
Ā 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Ā 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
Ā 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
Ā 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
Ā 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Ā 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ā 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
Ā 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Ā 
Cyber Security Landscape and Systems Resiliency ā€“ Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency ā€“ Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency ā€“ Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency ā€“ Challenges & Priorities - T...
Ā 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
Ā 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
Ā 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Ā 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
Ā 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
Ā 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
Ā 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Ā 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Ā 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Ā 

Viewers also liked

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
Ā 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
Ā 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
Ā 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
Ā 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionStephen Cobb
Ā 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecuritylfh663
Ā 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
Ā 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeStephen Cobb
Ā 
Cyber security
Cyber securityCyber security
Cyber securityHarsh verma
Ā 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business ContinuityStephen Cobb
Ā 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Stephen Cobb
Ā 
Malware and the risks of weaponizing code
Malware and the risks of weaponizing codeMalware and the risks of weaponizing code
Malware and the risks of weaponizing codeStephen Cobb
Ā 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
Ā 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
Ā 
Global threat landscape
Global threat landscapeGlobal threat landscape
Global threat landscapeJynette Reed
Ā 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsStephen Cobb
Ā 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
Ā 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
Ā 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
Ā 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
Ā 

Viewers also liked (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Ā 
Cyber security
Cyber securityCyber security
Cyber security
Ā 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
Ā 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Ā 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
Ā 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
Ā 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
Ā 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Ā 
Cyber security
Cyber securityCyber security
Cyber security
Ā 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
Ā 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Ā 
Malware and the risks of weaponizing code
Malware and the risks of weaponizing codeMalware and the risks of weaponizing code
Malware and the risks of weaponizing code
Ā 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
Ā 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
Ā 
Global threat landscape
Global threat landscapeGlobal threat landscape
Global threat landscape
Ā 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
Ā 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
Ā 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
Ā 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
Ā 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
Ā 

Similar to 2015: The year-ahead-in-cyber-security

Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
Ā 
Ethical Hacking and Cybersecurity ā€“ Key Trends in 2022
Ethical Hacking and Cybersecurity ā€“ Key Trends in 2022Ethical Hacking and Cybersecurity ā€“ Key Trends in 2022
Ethical Hacking and Cybersecurity ā€“ Key Trends in 2022PECB
Ā 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptxLuckySaigon1
Ā 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
Ā 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
Ā 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
Ā 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
Ā 
Cyber threat enterprise leadership required march 2014
Cyber threat   enterprise leadership required  march 2014Cyber threat   enterprise leadership required  march 2014
Cyber threat enterprise leadership required march 2014Peter ODell
Ā 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actorsOWASP EEE
Ā 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Robi Sen
Ā 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptxssusera5ade5
Ā 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
Ā 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
Ā 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3Lancope, Inc.
Ā 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
Ā 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Crafted
Ā 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
Ā 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
Ā 

Similar to 2015: The year-ahead-in-cyber-security (20)

Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
Ā 
Ethical Hacking and Cybersecurity ā€“ Key Trends in 2022
Ethical Hacking and Cybersecurity ā€“ Key Trends in 2022Ethical Hacking and Cybersecurity ā€“ Key Trends in 2022
Ethical Hacking and Cybersecurity ā€“ Key Trends in 2022
Ā 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
Ā 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
Ā 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Ā 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
Ā 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Ā 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
Ā 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Ā 
Cyber threat enterprise leadership required march 2014
Cyber threat   enterprise leadership required  march 2014Cyber threat   enterprise leadership required  march 2014
Cyber threat enterprise leadership required march 2014
Ā 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
Ā 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Ā 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
Ā 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
Ā 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
Ā 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
Ā 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
Ā 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?
Ā 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
Ā 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Ā 

More from Stephen Cobb

Cybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptxCybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptxStephen Cobb
Ā 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
Ā 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISOStephen Cobb
Ā 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills GapStephen Cobb
Ā 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
Ā 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
Ā 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of CybercrimeStephen Cobb
Ā 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseStephen Cobb
Ā 
Endpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategyEndpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategyStephen Cobb
Ā 
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrowStephen Cobb
Ā 

More from Stephen Cobb (10)

Cybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptxCybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptx
Ā 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
Ā 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISO
Ā 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
Ā 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
Ā 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
Ā 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
Ā 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
Ā 
Endpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategyEndpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategy
Ā 
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrow
Ā 

Recently uploaded

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
Ā 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
Ā 
Enjoy Nightāš”Call Girls Dlf City Phase 3 Gurgaon >ą¼’8448380779 Escort Service
Enjoy Nightāš”Call Girls Dlf City Phase 3 Gurgaon >ą¼’8448380779 Escort ServiceEnjoy Nightāš”Call Girls Dlf City Phase 3 Gurgaon >ą¼’8448380779 Escort Service
Enjoy Nightāš”Call Girls Dlf City Phase 3 Gurgaon >ą¼’8448380779 Escort ServiceDelhi Call girls
Ā 
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
Ā 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
Ā 
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
Ā 
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...SofiyaSharma5
Ā 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
Ā 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
Ā 
Hireā† Young Call Girls in Tilak nagar (Delhi) ā˜Žļø 9205541914 ā˜Žļø Independent Esc...
Hireā† Young Call Girls in Tilak nagar (Delhi) ā˜Žļø 9205541914 ā˜Žļø Independent Esc...Hireā† Young Call Girls in Tilak nagar (Delhi) ā˜Žļø 9205541914 ā˜Žļø Independent Esc...
Hireā† Young Call Girls in Tilak nagar (Delhi) ā˜Žļø 9205541914 ā˜Žļø Independent Esc...Delhi Call girls
Ā 

Recently uploaded (20)

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
Ā 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Ā 
Enjoy Nightāš”Call Girls Dlf City Phase 3 Gurgaon >ą¼’8448380779 Escort Service
Enjoy Nightāš”Call Girls Dlf City Phase 3 Gurgaon >ą¼’8448380779 Escort ServiceEnjoy Nightāš”Call Girls Dlf City Phase 3 Gurgaon >ą¼’8448380779 Escort Service
Enjoy Nightāš”Call Girls Dlf City Phase 3 Gurgaon >ą¼’8448380779 Escort Service
Ā 
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Ā 
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Mamura Sector 66 ( Noida)
Ā 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Ā 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Ā 
@9999965857 šŸ«¦ Sexy Desi Call Girls Laxmi Nagar šŸ’“ High Profile Escorts Delhi šŸ«¶
@9999965857 šŸ«¦ Sexy Desi Call Girls Laxmi Nagar šŸ’“ High Profile Escorts Delhi šŸ«¶@9999965857 šŸ«¦ Sexy Desi Call Girls Laxmi Nagar šŸ’“ High Profile Escorts Delhi šŸ«¶
@9999965857 šŸ«¦ Sexy Desi Call Girls Laxmi Nagar šŸ’“ High Profile Escorts Delhi šŸ«¶
Ā 
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ā˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Ā 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Ā 
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Ā 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Ā 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
Ā 
Hireā† Young Call Girls in Tilak nagar (Delhi) ā˜Žļø 9205541914 ā˜Žļø Independent Esc...
Hireā† Young Call Girls in Tilak nagar (Delhi) ā˜Žļø 9205541914 ā˜Žļø Independent Esc...Hireā† Young Call Girls in Tilak nagar (Delhi) ā˜Žļø 9205541914 ā˜Žļø Independent Esc...
Hireā† Young Call Girls in Tilak nagar (Delhi) ā˜Žļø 9205541914 ā˜Žļø Independent Esc...
Ā 

2015: The year-ahead-in-cyber-security

  • 1. 2015: Examining the threatscape for the year ahead Stephen Cobb, CISSP Senior Security Researcher
  • 2. Todayā€™s topic ā€¢ What cyber threats will your business face in 2015? ā€¢ From cyber criminals to nation states and hacktivists, threats are evolving ā€¢ What should you be doing now? ā€¢ The best use of resources to protect your business
  • 3. The agenda ā€¢ Defining moments of 2015 ā€¢ Lessons for 2015 ā€¢ Threats and responses ā€¢ Strategies for success
  • 4. Q1: Which 2014 security news story concerns you the most? ā€¢ Sony Pictures hacks ā€¢ JPMorgan Chase breach ā€¢ PSN DDoS attack ā€¢ Community Health Systems breach ā€¢ None of the above
  • 5. Defining moments: Sony+ ā€¢ Last year it was Snowden/Target ā€¢ This year itā€™s Sony ā€¢ Also maybe JP Morgan Chase ā€¢ With a touch of The Home Depot ā€¢ Plus The Home of a Despot ā€¢ Some politics and NSA ā€¢ And a sprinkle of IoT
  • 6. Defining moments ā€¢ Are teaching moments ā€¢ If we donā€™t learn from 2014 ā€¢ 2015 wonā€™t be any better
  • 7. Sony Pictures epic hack ā€¢ Data destroyed, stolen, exposed ā€¢ System availability denied/degraded ā€¢ Present and former employees personally impacted ā€¢ Lawsuits ā€¢ Brand damage
  • 8. Systemic security failure? ā€¢ A history of being attacked ā€¢ A ā€œlive with the risk attitudeā€ ā€¢ Known weaknesses not remedied ā€¢ PWC audit second half of July ā€“ One firewall and more than 100 other devices not monitored by corporate security team ā€“ Monitored by studioā€™s in-house group ā€“ "Security incidents impacting these network or infrastructure devices may not be detected or resolved timely"
  • 9. Lesson #1 ā€¢ Donā€™t leave unencrypted audit reports in executive email inboxes ā€¢ Donā€™t put into unencrypted email anything you may later regret saying or sharing (words, images, reports, etc.) ā€¢ Most email is unencrypted ā€¢ If they own your account, encryption is not going to keep secrets
  • 10. Lesson #2 ā€¢ Make your security awesome before you antagonize known hackers ā€¢ Or donā€™t antagonize known hackers ā€¢ Try asking your head of security if heā€™s okay with you taunting hackers ā€¢ If he says yes, get a second opinion
  • 11. Lesson #3 ā€¢ Hacktivism is here to stay ā€¢ The Internet is fundamentally asymmetric ā€¢ May discretion be the better part of cyber valor?
  • 12. JPMorgan Chase hack ā€¢ Deeper and wider than first announced ā€¢ ā€œThis was a sophisticated attack with nation state overtonesā€
  • 13.
  • 14. Lesson #4 ā€¢ Do all the right things all the time ā€¢ Yes, I know that is very hard to do ā€¢ But the scale of targeted attack activity is higher than ever ā€¢ E.g. fewer cyber attacks on retailers, but more efficient* *IBM 2014 Retail Intelligence Report
  • 15. Lesson #5 ā€¢ Donā€™t play the ā€œsophisticated nation state attackā€ card ā€¢ It makes you look bad later ā€¢ Both JPMorgan and Sony Pictures have tried this ā€¢ Why? Lays groundwork for legal defense against negligence claims*
  • 16. The Home Depot et al. ā€¢ Point of sale hacking continues, plus SQL injection attacks on retailers ā€¢ Look for more of the same, even as chip cards start to take over ā€¢ Transition period may offer points of entry for hackers ā€¢ Card data still useful for online fraud
  • 17. Q2: Chip cards are coming and they are hard to fake, so the people who now make money from card fraud will: ā€¢ Get jobs ā€¢ Try a different kind of fraud
  • 18. Lesson #6 ā€¢ Crime displacement ā€¢ EMV technology will make it harder to turn stolen payment card data into fake cards ā€¢ The people who buy card data to make fake cards will turn to other forms of crime: Identity theft?
  • 19. Tax ID fraud ā€¢ Cost taxpayers $5 billion in 2013 ā€¢ Will be big in 2015 ā€¢ An easy alternative to card fraud ā€¢ IRS needs to do more, but congress cut the IRS budget ā€¢ File early with fingers crossed ā€¢ Takes 9 months to correct (average)
  • 20. Some politics and NSA ā€¢ NSA court cases and legislation will keep privacy top of mind for many ā€¢ Political stalemate and lack of trust will hamper efforts to: ā€“ Share data between .gov and .com ā€“ Boost spending on cybercrime deterrence
  • 21. And a sprinkle of IoT ā€¢ The Internet of Things will continue to grow and get hacked ā€¢ Security threat to organizations still low relative to BYOD ā€¢ Except in sectors that use SCADA ā€¢ Privacy and rights issues may emerge re: webcams, company monitoring of IoT devices
  • 22.
  • 23. Lesson #7 ā€¢ Threatscape is wider than ever ā€¢ Cyber Crime, Inc. continues to dominate ā€“ Data about people = money ā€¢ Nation state hacking ā€“ From secret sauce to state secrets ā€¢ The resurgence of hacktivism ā€¢ All of the traditional IT security risks ā€“ Current and former employees, competitors, natural/human disasters (stormy weather?)
  • 24. Wildcards ā€¢ New forms of payment and currency: ā€“ Apple Pay and other digital wallets ā€“ Bitcoin and other virtual currencies ā€¢ Regional conflicts ā€¢ The weather
  • 25. Q3: A disaster puts your offices and computer off limits for 3 days. Are you: ā€¢ Well prepared with a written plan ready to execute ā€¢ Somewhat prepared ā€¢ Not clear on how you would cope ā€¢ In deep trouble
  • 26. Security strategies: BCM/IR ā€¢ Business Continuity Management and Incident Response meansā€¦ ā€¢ Preparing to respond to: ā€“ Security breaches, data theft ā€“ Privacy incidents, internal fraud ā€“ Extreme weather, man-made disasters ā€¢ At all levels: ā€“ Communications, people, processes, data and systems, recovery, analysis
  • 27. Security strategies: Backup ā€¢ The ultimate protection against ā€“ Data loss and data ransom ā€“ User error and system failure ā€“ Natural and man-made disasters ā€¢ Review current strategies and test current implementations ā€¢ Consider all options (cloud, physical)
  • 28. Strategies: Encryption ā€¢ Time to do more encryption, not less ā€¢ Encryption products have improved ā€¢ Offer protection in case of breach ā€¢ Encrypt in transit as well as at rest ā€¢ Check your cloud providerā€™s use of encryption e.g. between data centers
  • 29. Strategies: Policy/compliance ā€¢ Start of the new year is a good time to check: ā€¢ Are your information security policies complete and up-to-date ā€“ New technologies, new data, new hires ā€¢ Are you aware of new laws affecting your compliance around privacy, data protection?
  • 30. Strategies for success ā€¢ Are you responsible for protecting data and systems? ā€¢ Donā€™t panic, you are not alone ā€¢ Leverage heightened awareness (courtesy Snowden-Target- HomeDepot-Sony-JPMorgan) ā€¢ Take a structured approach
  • 31.
  • 32. You are not alone ā€¢ Network with others, across departments up/down the org chart ā€¢ Within and beyond the organization ā€¢ Chamber, BBB, SBA ā€¢ ISSA, ISACA, (ISC)2, IAPP ā€¢ ISACs, InfraGard, NCSA, VB ā€¢ NIST, SOeC
  • 33. IT Security and Privacy Groups ā€¢ See attachments ā€¢ Get involved
  • 34. Revisit roadblocks ā€¢ In 2015 the public and press will be on high alert re: privacy and security ā€¢ Bosses may not ā€œlikeā€ security but breaches = lost customers, lost revenue, lost jobs ā€¢ Employees make be more interested in security than you think
  • 35. If all else fails try fear of headlines
  • 36. Last word: Due care ā€¢ Remember: complying with rules & regulations (e.g. PCI, HIPAA, SOX) is not the same as being secure ā€¢ Your security will be judged in the courts: media, public opinion, law ā€¢ Liability under law hinges on reasonableness, due care
  • 37. Thank you! Have a safer 2015! ā€¢ stephen.cobb@eset.com ā€¢ WeLiveSecurity.com ā€¢ www.eset.com ā€¢ www.slideshare.net/zcobb