SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Securing the Cloud
Glenn Solomon
Feb 2016
• 1 team in the US and China
• $2.6 billion under management
• 6 funds | 150+ investments
• 15 years | 27 IPOs
GLEN N SOLOMON
• Managing Partner
• 10 years at GGV Capital
• Enterprise, SaaS, Cloud, Security, Mobile
• goinglongblog.com | @glennsolomon
Cybercrime is a Growth Industry
Source: 2015 Verizon DBIR Report; ITRC ; HP 2015 Cost of Cyber Crime Study; The Global State of Information Security Survey 2015; McAfee Net Losses –
Estimating the Cost of Cybercrime
42.8M
Security
Incidents
5,810
Confirmed
Data Breaches
61
Countries
$445B
Annual Cost
to the Global
Economy
Data Breaches by the Numbers
Data Records Lost or Stolen in 2014
2,803,306 records lost or stolen every day
116,793 records every hour
1,947 records every minute
32 records every second
Source: SafeNet – The Art of Data Protection, Feb 2015
Only 4% of breaches were “Secure
Breaches” where encryption was used
and the stolen data was rendered
useless
Data Breaches are across all Industries
Source: WSJ
Hackers & Their Weapons
Participants
Hackers
Hacktivists
Criminal Organizations
Commercial Vendors
State Sponsored Terror Groups
Available to Purchase
Hacking Tools
Zero-day Exploits
Credit Card Data
eCommerce/Social-
Media Credentials
Key Participants
Eastern Europe
Russia
China
US
Latin America
Source: RAND National Security Research Division
The Cybersecurity Landscape is Vast
Source: Momentum Partners
Common Threats & Victims
Identity Theft Phishing Social Engineering Cyber AttackCyber Extortion
When you protect your company, you need to focus on all possible weaknesses.
Hackers only need to find one way in…
The Corporate Challenge
Source: 2015 Verizon DBIR Report; BTIG Security Report – Attack of the Clones
Cloud-based
Applications
Social
Networking
Virtualization BYOD
83 million software
applications today;
141 million by 2017
Stolen or weak
credentials involved in
76% of cyber attacks
14% of attacks or
exploits are on cloud
services, applications,
or storage systems
Mobile security
breaches have
affected 65% of global
organizations in
the last 12 months
The Next Generation of Cyber Security
Source: BTIG Security Report – Attack of the Clones
Legacy Security Companies Next Generation Equivalent
Firewall/Intrusion Prevention System Next Generation Network Security
Antivirus Next Generation Endpoint/Malicious Detection
Web Gateway/URL Filtering Cloud Security & Data Protection
Authentication, Authorization &
Accounting
Identity & Access Management – The New Perimeter
Secure Event Management Security Intelligence & Analytics
Data Security Data Security, Discovery, Clarification, Control & Intel
Data Loss Prevention Inside Threat Protection
Governance, Risk Management &
Compliance
Compliance Automation and Data Governance
New Threat Vectors
Source: Immuniweb, Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report
Social Media Protection
While email remains a
significant attack vector, 70% of
social media scams were
manually shared.
Advanced Persistent Threats
Zero-day exploits are almost impossible
to detect and will work 9 out of 10
cases because they have legal, financial
and banking industry experts,
psychologists, and even ex-law
enforcement officers behind them.
Insider Threats
Privileged users, such as managers with
access to sensitive information, pose the
biggest insider threat to organizations.
This is followed by contractors,
consultants, and regular employees.
Compromised account credentials, or
when someone’s account is hijacked, are
also a big part of this risk.
New Threat Vectors
Internet of Things
These hubs, switches, and
router are increasingly used to
target the network. They have
processing, storage, and
internet connectivity.
Mobile Security &
Protection
As more users rely on their
mobile devices, more spam,
scams, and threats are tailored
to these devices. Mobile
malware such as bootkits will
become harder to remove.
Critical Infrastructure
The most significant trend is the
use of malware to compromise
supervisory control and data
acquisition (SCADA) systems,
including Homeless
Management Information
System (HMIS), historians, and
other connected devices.
Source: Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report
Approaches Over Time
1987-2009 2009-2014 2014 onward 2015 onward
Signatures Sandboxes Anomaly Detection Zero-Trust
APT
Attack Sophistication Level
Hammertoss, Black Energy, etc
Endpoint
Content
Network
Source: Based on Agari presentation material
Modern Security Challenges in the Cloud
Challenge: Corporate services are migrating to the cloud
Secure Application Access
Privileged Access
Management
Multi-Factor
Authentication
FirewallsNetwork Access Control SSO
Challenge: Dynamic workloads due to multi-tiered apps & virtualization, containers, micro-services, etc.
Protect Server to Server Interactions
Cloud Workload ManagementMachine Firewalls
Modern Security Challenges in the Cloud (cont)
Challenge: Employees on websites via HTTP and mail –some malicious
Securing Employee to Internet
Cloud Policy ManagementCloud Access Security Brokers SaaS Data Encryption
Challenge: Rapid development cycles leave little room for security checks
Web App Security
RASPsWAFs CDNs
Emerging Protection for Emerging Threats
Insider Threat Detection
Machine Learning to Spot Attacks
Industrial & Connected Device Security
Security Startups Raised $10.9B across 1074 Deals since 2010
Source: Momentum Partners, CB Insights
Additional Resources
Books Blogs
http://goinglongblog.com/
https://krebsonsecurity.com/
Q&A

Weitere ähnliche Inhalte

Was ist angesagt?

A non-technical introduction to ChatGPT - SEDA.pptx
A non-technical introduction to ChatGPT - SEDA.pptxA non-technical introduction to ChatGPT - SEDA.pptx
A non-technical introduction to ChatGPT - SEDA.pptxSue Beckingham
 
Generative AI Risks & Concerns
Generative AI Risks & ConcernsGenerative AI Risks & Concerns
Generative AI Risks & ConcernsAjitesh Kumar
 
The-DALL·E-2-prompt-book-v1.02.pdf
The-DALL·E-2-prompt-book-v1.02.pdfThe-DALL·E-2-prompt-book-v1.02.pdf
The-DALL·E-2-prompt-book-v1.02.pdfYoDaddie
 
The Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundThe Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundBen Lang
 
apidays Helsinki & North 2023 - What Generative AI Really Means To Cloud Ecos...
apidays Helsinki & North 2023 - What Generative AI Really Means To Cloud Ecos...apidays Helsinki & North 2023 - What Generative AI Really Means To Cloud Ecos...
apidays Helsinki & North 2023 - What Generative AI Really Means To Cloud Ecos...apidays
 
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deckMonzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deckAA BB
 
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of WorkBeyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of WorkThumbtack, Inc.
 
Airbyte - Series-B deck
Airbyte - Series-B deckAirbyte - Series-B deck
Airbyte - Series-B deckAirbyte
 
WeWork Pitch Deck 2014
WeWork Pitch Deck 2014WeWork Pitch Deck 2014
WeWork Pitch Deck 2014startuphome
 
Solve for X with AI: a VC view of the Machine Learning & AI landscape
Solve for X with AI: a VC view of the Machine Learning & AI landscapeSolve for X with AI: a VC view of the Machine Learning & AI landscape
Solve for X with AI: a VC view of the Machine Learning & AI landscapeEd Fernandez
 
AI INSURANCE SPOTLIGHT
AI INSURANCE SPOTLIGHTAI INSURANCE SPOTLIGHT
AI INSURANCE SPOTLIGHTAlbanTranchard
 
Pitch Deck Teardown: Careerist's $8M Series A deck
Pitch Deck Teardown: Careerist's $8M Series A deckPitch Deck Teardown: Careerist's $8M Series A deck
Pitch Deck Teardown: Careerist's $8M Series A deckHajeJanKamps
 
Hoof Pitch Deck - Payments Platform
Hoof Pitch Deck - Payments PlatformHoof Pitch Deck - Payments Platform
Hoof Pitch Deck - Payments PlatformGeorge Johnson
 
14 2 2023 - AI & Marketing - Hugues Rey.pdf
14 2 2023 - AI & Marketing - Hugues Rey.pdf14 2 2023 - AI & Marketing - Hugues Rey.pdf
14 2 2023 - AI & Marketing - Hugues Rey.pdfHugues Rey
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith YeungEdith Yeung
 
Stripe Pitch Deck designed by Zlides
Stripe Pitch Deck designed by ZlidesStripe Pitch Deck designed by Zlides
Stripe Pitch Deck designed by ZlidesZlides
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AICori Faklaris
 
Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution Monty C. M. Metzger
 

Was ist angesagt? (20)

A non-technical introduction to ChatGPT - SEDA.pptx
A non-technical introduction to ChatGPT - SEDA.pptxA non-technical introduction to ChatGPT - SEDA.pptx
A non-technical introduction to ChatGPT - SEDA.pptx
 
Generative AI Risks & Concerns
Generative AI Risks & ConcernsGenerative AI Risks & Concerns
Generative AI Risks & Concerns
 
The-DALL·E-2-prompt-book-v1.02.pdf
The-DALL·E-2-prompt-book-v1.02.pdfThe-DALL·E-2-prompt-book-v1.02.pdf
The-DALL·E-2-prompt-book-v1.02.pdf
 
The Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundThe Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed Round
 
apidays Helsinki & North 2023 - What Generative AI Really Means To Cloud Ecos...
apidays Helsinki & North 2023 - What Generative AI Really Means To Cloud Ecos...apidays Helsinki & North 2023 - What Generative AI Really Means To Cloud Ecos...
apidays Helsinki & North 2023 - What Generative AI Really Means To Cloud Ecos...
 
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deckMonzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
 
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of WorkBeyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
 
Airbyte - Series-B deck
Airbyte - Series-B deckAirbyte - Series-B deck
Airbyte - Series-B deck
 
WeWork Pitch Deck 2014
WeWork Pitch Deck 2014WeWork Pitch Deck 2014
WeWork Pitch Deck 2014
 
Solve for X with AI: a VC view of the Machine Learning & AI landscape
Solve for X with AI: a VC view of the Machine Learning & AI landscapeSolve for X with AI: a VC view of the Machine Learning & AI landscape
Solve for X with AI: a VC view of the Machine Learning & AI landscape
 
AI INSURANCE SPOTLIGHT
AI INSURANCE SPOTLIGHTAI INSURANCE SPOTLIGHT
AI INSURANCE SPOTLIGHT
 
The Creative Ai storm
The Creative Ai stormThe Creative Ai storm
The Creative Ai storm
 
Pitch Deck Teardown: Careerist's $8M Series A deck
Pitch Deck Teardown: Careerist's $8M Series A deckPitch Deck Teardown: Careerist's $8M Series A deck
Pitch Deck Teardown: Careerist's $8M Series A deck
 
Hoof Pitch Deck - Payments Platform
Hoof Pitch Deck - Payments PlatformHoof Pitch Deck - Payments Platform
Hoof Pitch Deck - Payments Platform
 
14 2 2023 - AI & Marketing - Hugues Rey.pdf
14 2 2023 - AI & Marketing - Hugues Rey.pdf14 2 2023 - AI & Marketing - Hugues Rey.pdf
14 2 2023 - AI & Marketing - Hugues Rey.pdf
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung
 
Stripe Pitch Deck designed by Zlides
Stripe Pitch Deck designed by ZlidesStripe Pitch Deck designed by Zlides
Stripe Pitch Deck designed by Zlides
 
Apple: The Next King of Search By Ian Sefferman
Apple: The Next King of Search By Ian SeffermanApple: The Next King of Search By Ian Sefferman
Apple: The Next King of Search By Ian Sefferman
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution
 

Andere mochten auch

Rethinking Transformational Change
Rethinking Transformational ChangeRethinking Transformational Change
Rethinking Transformational ChangeJason Little
 
31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & OfflinePixc
 
TEDxSanFrancisco – Review
TEDxSanFrancisco – ReviewTEDxSanFrancisco – Review
TEDxSanFrancisco – ReviewNiki Skene
 
Net neutrality: The Basics
Net neutrality: The BasicsNet neutrality: The Basics
Net neutrality: The BasicsInterQuest Group
 
The Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaThe Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaFuture Insights
 
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...AdNerds
 
Business optimization | building your first million is easy
Business optimization | building your first million is easyBusiness optimization | building your first million is easy
Business optimization | building your first million is easySurjeet Singh
 
Innovation Enablers: Culture, Community & Code
Innovation Enablers: Culture, Community & Code Innovation Enablers: Culture, Community & Code
Innovation Enablers: Culture, Community & Code Angel Diaz
 
Kuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesKuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesEric Tachibana
 
ADP ReThink 2016: Evolution of Work
ADP ReThink 2016: Evolution of WorkADP ReThink 2016: Evolution of Work
ADP ReThink 2016: Evolution of WorkADP, LLC
 
Facebook et la présidentielle 2012
Facebook et la présidentielle 2012Facebook et la présidentielle 2012
Facebook et la présidentielle 2012Publicis Consultants
 
Enterprise 2.0 @ Sun Microsystems
Enterprise 2.0 @ Sun MicrosystemsEnterprise 2.0 @ Sun Microsystems
Enterprise 2.0 @ Sun MicrosystemsPeter H. Reiser
 
Vers une architecture de l'information
Vers une architecture de l'informationVers une architecture de l'information
Vers une architecture de l'informationAndrea Resmini
 
Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroIBM Security
 
Offline is the new online - Le futur d'internet n'est plus derrière un écran
Offline is the new online - Le futur d'internet n'est plus derrière un écranOffline is the new online - Le futur d'internet n'est plus derrière un écran
Offline is the new online - Le futur d'internet n'est plus derrière un écranCedric Giorgi
 
Understanding strategy in innovation and technology oriented business
Understanding strategy in innovation and technology oriented businessUnderstanding strategy in innovation and technology oriented business
Understanding strategy in innovation and technology oriented businessDurgarao Gundu
 
Knowledge Management: Putting Information to Good Use
Knowledge Management: Putting Information to Good UseKnowledge Management: Putting Information to Good Use
Knowledge Management: Putting Information to Good UseSlideShop.com
 
The Future of Education is Digital
The Future of Education is DigitalThe Future of Education is Digital
The Future of Education is DigitalPaul Brown
 

Andere mochten auch (20)

Rethinking Transformational Change
Rethinking Transformational ChangeRethinking Transformational Change
Rethinking Transformational Change
 
31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline
 
TEDxSanFrancisco – Review
TEDxSanFrancisco – ReviewTEDxSanFrancisco – Review
TEDxSanFrancisco – Review
 
Net neutrality: The Basics
Net neutrality: The BasicsNet neutrality: The Basics
Net neutrality: The Basics
 
The Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaThe Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'Shea
 
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
 
Business optimization | building your first million is easy
Business optimization | building your first million is easyBusiness optimization | building your first million is easy
Business optimization | building your first million is easy
 
Innovation Enablers: Culture, Community & Code
Innovation Enablers: Culture, Community & Code Innovation Enablers: Culture, Community & Code
Innovation Enablers: Culture, Community & Code
 
Innovating supply chains in Asia
Innovating supply chains in AsiaInnovating supply chains in Asia
Innovating supply chains in Asia
 
Kuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesKuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employees
 
ADP ReThink 2016: Evolution of Work
ADP ReThink 2016: Evolution of WorkADP ReThink 2016: Evolution of Work
ADP ReThink 2016: Evolution of Work
 
Facebook et la présidentielle 2012
Facebook et la présidentielle 2012Facebook et la présidentielle 2012
Facebook et la présidentielle 2012
 
Enterprise 2.0 @ Sun Microsystems
Enterprise 2.0 @ Sun MicrosystemsEnterprise 2.0 @ Sun Microsystems
Enterprise 2.0 @ Sun Microsystems
 
Vers une architecture de l'information
Vers une architecture de l'informationVers une architecture de l'information
Vers une architecture de l'information
 
Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security Superhero
 
Brennpunkt2015 Neuburger
Brennpunkt2015 NeuburgerBrennpunkt2015 Neuburger
Brennpunkt2015 Neuburger
 
Offline is the new online - Le futur d'internet n'est plus derrière un écran
Offline is the new online - Le futur d'internet n'est plus derrière un écranOffline is the new online - Le futur d'internet n'est plus derrière un écran
Offline is the new online - Le futur d'internet n'est plus derrière un écran
 
Understanding strategy in innovation and technology oriented business
Understanding strategy in innovation and technology oriented businessUnderstanding strategy in innovation and technology oriented business
Understanding strategy in innovation and technology oriented business
 
Knowledge Management: Putting Information to Good Use
Knowledge Management: Putting Information to Good UseKnowledge Management: Putting Information to Good Use
Knowledge Management: Putting Information to Good Use
 
The Future of Education is Digital
The Future of Education is DigitalThe Future of Education is Digital
The Future of Education is Digital
 

Ähnlich wie Securing the Cloud

Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 

Ähnlich wie Securing the Cloud (20)

Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 

Mehr von GGV Capital

THE DIGITAL ECONOMY INDEX 2021
THE DIGITAL ECONOMY INDEX 2021THE DIGITAL ECONOMY INDEX 2021
THE DIGITAL ECONOMY INDEX 2021GGV Capital
 
THE DIGITAL ECONOMY INDEX 2020
THE DIGITAL ECONOMY INDEX 2020THE DIGITAL ECONOMY INDEX 2020
THE DIGITAL ECONOMY INDEX 2020GGV Capital
 
Lessons from US & China for Global Entrepreneurs
Lessons from US & China for Global EntrepreneursLessons from US & China for Global Entrepreneurs
Lessons from US & China for Global EntrepreneursGGV Capital
 
Hans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
Hans Y Combinator Presentation on Lessons from China for Global EntrepreneursHans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
Hans Y Combinator Presentation on Lessons from China for Global EntrepreneursGGV Capital
 
WSJ Converge 2017 Final: China Frontier Tech Trends
WSJ Converge 2017 Final: China Frontier Tech TrendsWSJ Converge 2017 Final: China Frontier Tech Trends
WSJ Converge 2017 Final: China Frontier Tech TrendsGGV Capital
 
Evolving Ecommerce NYC Summit Quotes
Evolving Ecommerce NYC Summit QuotesEvolving Ecommerce NYC Summit Quotes
Evolving Ecommerce NYC Summit QuotesGGV Capital
 
Evolving Enterprise Highlights
Evolving Enterprise HighlightsEvolving Enterprise Highlights
Evolving Enterprise HighlightsGGV Capital
 
2016 Year in Review
2016 Year in Review2016 Year in Review
2016 Year in ReviewGGV Capital
 
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016GGV Capital
 
GGV Capital 2015 Year in Review
GGV Capital 2015 Year in ReviewGGV Capital 2015 Year in Review
GGV Capital 2015 Year in ReviewGGV Capital
 
Monetization in the US and China: Where to Invest
Monetization in the US and China: Where to InvestMonetization in the US and China: Where to Invest
Monetization in the US and China: Where to InvestGGV Capital
 
The Mobile Generation: China's Millennials
The Mobile Generation: China's MillennialsThe Mobile Generation: China's Millennials
The Mobile Generation: China's MillennialsGGV Capital
 
GGV Capital Cross-Border Opportunities
GGV Capital Cross-Border OpportunitiesGGV Capital Cross-Border Opportunities
GGV Capital Cross-Border OpportunitiesGGV Capital
 
GGV Capital Mobile Trends Review
GGV Capital Mobile Trends ReviewGGV Capital Mobile Trends Review
GGV Capital Mobile Trends ReviewGGV Capital
 
Silicon Valley and Emerging Markets
Silicon Valley and Emerging Markets Silicon Valley and Emerging Markets
Silicon Valley and Emerging Markets GGV Capital
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
State of the US VC Market
State of the US VC MarketState of the US VC Market
State of the US VC MarketGGV Capital
 
GGV Capital Viewpoint: Internet of Things
GGV Capital Viewpoint: Internet of ThingsGGV Capital Viewpoint: Internet of Things
GGV Capital Viewpoint: Internet of ThingsGGV Capital
 
Sales and Marketing 3.0: The High Velocity Model
Sales and Marketing 3.0: The High Velocity ModelSales and Marketing 3.0: The High Velocity Model
Sales and Marketing 3.0: The High Velocity ModelGGV Capital
 
GGV Capital Year in Review 2014
GGV Capital Year in Review 2014GGV Capital Year in Review 2014
GGV Capital Year in Review 2014GGV Capital
 

Mehr von GGV Capital (20)

THE DIGITAL ECONOMY INDEX 2021
THE DIGITAL ECONOMY INDEX 2021THE DIGITAL ECONOMY INDEX 2021
THE DIGITAL ECONOMY INDEX 2021
 
THE DIGITAL ECONOMY INDEX 2020
THE DIGITAL ECONOMY INDEX 2020THE DIGITAL ECONOMY INDEX 2020
THE DIGITAL ECONOMY INDEX 2020
 
Lessons from US & China for Global Entrepreneurs
Lessons from US & China for Global EntrepreneursLessons from US & China for Global Entrepreneurs
Lessons from US & China for Global Entrepreneurs
 
Hans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
Hans Y Combinator Presentation on Lessons from China for Global EntrepreneursHans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
Hans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
 
WSJ Converge 2017 Final: China Frontier Tech Trends
WSJ Converge 2017 Final: China Frontier Tech TrendsWSJ Converge 2017 Final: China Frontier Tech Trends
WSJ Converge 2017 Final: China Frontier Tech Trends
 
Evolving Ecommerce NYC Summit Quotes
Evolving Ecommerce NYC Summit QuotesEvolving Ecommerce NYC Summit Quotes
Evolving Ecommerce NYC Summit Quotes
 
Evolving Enterprise Highlights
Evolving Enterprise HighlightsEvolving Enterprise Highlights
Evolving Enterprise Highlights
 
2016 Year in Review
2016 Year in Review2016 Year in Review
2016 Year in Review
 
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
 
GGV Capital 2015 Year in Review
GGV Capital 2015 Year in ReviewGGV Capital 2015 Year in Review
GGV Capital 2015 Year in Review
 
Monetization in the US and China: Where to Invest
Monetization in the US and China: Where to InvestMonetization in the US and China: Where to Invest
Monetization in the US and China: Where to Invest
 
The Mobile Generation: China's Millennials
The Mobile Generation: China's MillennialsThe Mobile Generation: China's Millennials
The Mobile Generation: China's Millennials
 
GGV Capital Cross-Border Opportunities
GGV Capital Cross-Border OpportunitiesGGV Capital Cross-Border Opportunities
GGV Capital Cross-Border Opportunities
 
GGV Capital Mobile Trends Review
GGV Capital Mobile Trends ReviewGGV Capital Mobile Trends Review
GGV Capital Mobile Trends Review
 
Silicon Valley and Emerging Markets
Silicon Valley and Emerging Markets Silicon Valley and Emerging Markets
Silicon Valley and Emerging Markets
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
State of the US VC Market
State of the US VC MarketState of the US VC Market
State of the US VC Market
 
GGV Capital Viewpoint: Internet of Things
GGV Capital Viewpoint: Internet of ThingsGGV Capital Viewpoint: Internet of Things
GGV Capital Viewpoint: Internet of Things
 
Sales and Marketing 3.0: The High Velocity Model
Sales and Marketing 3.0: The High Velocity ModelSales and Marketing 3.0: The High Velocity Model
Sales and Marketing 3.0: The High Velocity Model
 
GGV Capital Year in Review 2014
GGV Capital Year in Review 2014GGV Capital Year in Review 2014
GGV Capital Year in Review 2014
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Securing the Cloud

  • 1. Securing the Cloud Glenn Solomon Feb 2016
  • 2. • 1 team in the US and China • $2.6 billion under management • 6 funds | 150+ investments • 15 years | 27 IPOs GLEN N SOLOMON • Managing Partner • 10 years at GGV Capital • Enterprise, SaaS, Cloud, Security, Mobile • goinglongblog.com | @glennsolomon
  • 3. Cybercrime is a Growth Industry Source: 2015 Verizon DBIR Report; ITRC ; HP 2015 Cost of Cyber Crime Study; The Global State of Information Security Survey 2015; McAfee Net Losses – Estimating the Cost of Cybercrime 42.8M Security Incidents 5,810 Confirmed Data Breaches 61 Countries $445B Annual Cost to the Global Economy
  • 4. Data Breaches by the Numbers Data Records Lost or Stolen in 2014 2,803,306 records lost or stolen every day 116,793 records every hour 1,947 records every minute 32 records every second Source: SafeNet – The Art of Data Protection, Feb 2015 Only 4% of breaches were “Secure Breaches” where encryption was used and the stolen data was rendered useless
  • 5. Data Breaches are across all Industries Source: WSJ
  • 6. Hackers & Their Weapons Participants Hackers Hacktivists Criminal Organizations Commercial Vendors State Sponsored Terror Groups Available to Purchase Hacking Tools Zero-day Exploits Credit Card Data eCommerce/Social- Media Credentials Key Participants Eastern Europe Russia China US Latin America Source: RAND National Security Research Division
  • 7. The Cybersecurity Landscape is Vast Source: Momentum Partners
  • 8. Common Threats & Victims Identity Theft Phishing Social Engineering Cyber AttackCyber Extortion When you protect your company, you need to focus on all possible weaknesses. Hackers only need to find one way in…
  • 9. The Corporate Challenge Source: 2015 Verizon DBIR Report; BTIG Security Report – Attack of the Clones Cloud-based Applications Social Networking Virtualization BYOD 83 million software applications today; 141 million by 2017 Stolen or weak credentials involved in 76% of cyber attacks 14% of attacks or exploits are on cloud services, applications, or storage systems Mobile security breaches have affected 65% of global organizations in the last 12 months
  • 10. The Next Generation of Cyber Security Source: BTIG Security Report – Attack of the Clones Legacy Security Companies Next Generation Equivalent Firewall/Intrusion Prevention System Next Generation Network Security Antivirus Next Generation Endpoint/Malicious Detection Web Gateway/URL Filtering Cloud Security & Data Protection Authentication, Authorization & Accounting Identity & Access Management – The New Perimeter Secure Event Management Security Intelligence & Analytics Data Security Data Security, Discovery, Clarification, Control & Intel Data Loss Prevention Inside Threat Protection Governance, Risk Management & Compliance Compliance Automation and Data Governance
  • 11. New Threat Vectors Source: Immuniweb, Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report Social Media Protection While email remains a significant attack vector, 70% of social media scams were manually shared. Advanced Persistent Threats Zero-day exploits are almost impossible to detect and will work 9 out of 10 cases because they have legal, financial and banking industry experts, psychologists, and even ex-law enforcement officers behind them. Insider Threats Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations. This is followed by contractors, consultants, and regular employees. Compromised account credentials, or when someone’s account is hijacked, are also a big part of this risk.
  • 12. New Threat Vectors Internet of Things These hubs, switches, and router are increasingly used to target the network. They have processing, storage, and internet connectivity. Mobile Security & Protection As more users rely on their mobile devices, more spam, scams, and threats are tailored to these devices. Mobile malware such as bootkits will become harder to remove. Critical Infrastructure The most significant trend is the use of malware to compromise supervisory control and data acquisition (SCADA) systems, including Homeless Management Information System (HMIS), historians, and other connected devices. Source: Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report
  • 13. Approaches Over Time 1987-2009 2009-2014 2014 onward 2015 onward Signatures Sandboxes Anomaly Detection Zero-Trust APT Attack Sophistication Level Hammertoss, Black Energy, etc Endpoint Content Network Source: Based on Agari presentation material
  • 14. Modern Security Challenges in the Cloud Challenge: Corporate services are migrating to the cloud Secure Application Access Privileged Access Management Multi-Factor Authentication FirewallsNetwork Access Control SSO Challenge: Dynamic workloads due to multi-tiered apps & virtualization, containers, micro-services, etc. Protect Server to Server Interactions Cloud Workload ManagementMachine Firewalls
  • 15. Modern Security Challenges in the Cloud (cont) Challenge: Employees on websites via HTTP and mail –some malicious Securing Employee to Internet Cloud Policy ManagementCloud Access Security Brokers SaaS Data Encryption Challenge: Rapid development cycles leave little room for security checks Web App Security RASPsWAFs CDNs
  • 16. Emerging Protection for Emerging Threats Insider Threat Detection Machine Learning to Spot Attacks Industrial & Connected Device Security
  • 17. Security Startups Raised $10.9B across 1074 Deals since 2010 Source: Momentum Partners, CB Insights
  • 19. Q&A