SlideShare a Scribd company logo
1 of 42
Download to read offline
© 2015 Imperva, Inc. All rights reserved.
Top Cyber Security Trends
for 2016
Amichai Shulman, CTO, Imperva
December 16, 2015
© 2015 Imperva, Inc. All rights reserved.
Amichai Shulman – CTO, Imperva
•  Speaker at industry events
–  RSA, Appsec, Info Security UK, Black Hat
•  Lecturer on information security
–  Technion - Israel Institute of Technology
•  Former security consultant to banks and financial services firms
•  Leads the Imperva Application Defense Center (ADC)
–  Discovered over 20 commercial application vulnerabilities
–  Credited by Oracle, MSSQL, IBM and Others
2
Amichai Shulman one of InfoWorld’s “Top 25 CTOs”
© 2015 Imperva, Inc. All rights reserved.
Agenda
•  Introduction
•  2015 Forecast Score Card
•  2016 Cyber Security Trends
•  Summary and Conclusion
•  Q&A
3
© 2015 Imperva, Inc. All rights reserved.
2015 Score Card
4
Trend Score
1 Targeted attacks change their nature	
   A
2 Patching is going to become impossible A-
3 DDoS is growing at the Internet rate A
4 SSL is at a tipping point A-
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #1:
IoT / BoT - Botnet of Things
1
5
© 2015 Imperva, Inc. All rights reserved.
BoT - Botnet of Things
6
© 2015 Imperva, Inc. All rights reserved.
Hacking the Fridge
7
© 2015 Imperva, Inc. All rights reserved.
Asking the Right Question
•  Can someone hack my toaster?
8
© 2015 Imperva, Inc. All rights reserved.
Asking the Right Question
•  Can someone hack my toaster? •  Can my network be attacked with a
shoe?
9
The Internet
of Things
A dramatic increase in
networked devices leads
to more opportunities for
ATTACK
The Internet
of Things
© 2015 Imperva, Inc. All rights reserved.
BoT - Botnet of Things
•  Connected IoT devices will never have “adequate” security
–  Device take over
–  Credential theft
•  Botnets can grow larger undetected
–  More opportunity – easier to form larger botnets
–  More DDoS as a Service opportunity
•  Possible increase in exposure from insiders
–  BYOD on steroids
–  Watch, wearables and others not as secure
–  More compromised devices in the vicinity of enterprise networks
11
© 2015 Imperva, Inc. All rights reserved.
Our Prediction
•  More people talking about the wrong problems
•  More “IoT” based botnets
•  More incidents to link personal credentials with IoT breaches
•  Highly sensitive companies starting to feel the pressure (not until the end of
the year)
12
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #2:
Rise of Insider Threat
2
13
© 2015 Imperva, Inc. All rights reserved.
Rise of Insider Threat
14
Globally 89% of respondents felt that their organization was now more at
risk from an insider attack – Vormetric 2015
“55% of the Incidents from Internal Actors due to Privilege Abuse”
-Verizon DBIR 2015
MaliciousCarelessCompromised
© 2015 Imperva, Inc. All rights reserved.
Outside In
•  Personal attack surface is growing
–  Social, mobile, IoE
–  We are extremely exposed and extremely vulnerable
•  Engaged employees are a two way sword
–  Mix work and personal life
–  Most infections happen during office hours, 20% of infected machines attributed to
enterprise networks
•  End stations are increasingly vulnerable
–  Tracking the number of patched vulnerabilities in end point components suggests a
growing backlog with a constant fixing capacity
16
© 2015 Imperva, Inc. All rights reserved.
Inside Out
•  Shadow IT
–  Unmanaged Database servers
–  Partly commissioned SaaS applications
•  More employees and more collaboration
–  Barriers are taken down
•  Shared data repositories with trusted partners
•  Sensitive data is everywhere
–  Cloud applications provide direct access without IT control
–  Big data lakes
–  1000s of “traditional” databases
17
© 2015 Imperva, Inc. All rights reserved.
Our Predictions
•  Decrease in detection rates
–  Most solutions look for the tools and not the attack
–  Attackers have all the infrastructure in place to evade ANY solution that takes the
above approach
•  Increase in absolute number of attacks of internal nature
•  Large increase in total number and percentage of incidents of internal nature
18
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #3:
Data Security for the Big and Small
3
19
© 2015 Imperva, Inc. All rights reserved.
Big Breaches = Big Price Tag
•  Cost of data breach is higher than anticipated
–  Target’s gross breach expenses totaled $252 million, insurance compensation brought that
down to $162 million
–  Home Depot expects $100 million in insurance payments toward $232 million in expenses
from its 2014 breach
–  Anthem breach expected to cost more than $100 millions
20
© 2015 Imperva, Inc. All rights reserved.
Big Breaches Start Small
•  Target breach started with a
compromised HVAC company
•  T-Mobile customer data breached
through Experian
•  JPMC customer data breached after
an affiliate was breached
•  Lockheed Martin breach through
RSA
21
© 2015 Imperva, Inc. All rights reserved.
Smaller Companies are Targets
•  While sophisticated, targeted attacks do exists they are a negligible minority
•  80% of infections stem from massive eMail campaigns
•  Smaller organizations are infected and compromised as much as larger ones
(or even more)
•  Attackers are aware of 3rd party relationships between large targets and
smaller service providers
•  Transfer of liabilities may prove to be devastating for a smaller 3rd party
22
© 2015 Imperva, Inc. All rights reserved.
Cyber Insurance is Not a Silver Bullet
•  Big breaches leave some of the costs uncovered
•  Insurance claims result in higher policy costs in the future
–  “Health insurers who suffered hacks are facing the most extreme increases, with some
premiums tripling at renewal time” - Bob Wice, a leader of Beazley Plc's cyber insurance
practice
•  Policy cost is detrimental for smaller business
–  Insurers are not proficient yet in assessing the risks
–  May consider making coverage conditional on a full and frequent assessment of
policyholder vulnerabilities (PwC Research)
–  Especially true for 3rd party liabilities
23
© 2015 Imperva, Inc. All rights reserved.
Our Predictions
•  Continuing on our previous prediction – smaller organizations are going to
continue falling prey in larger numbers
•  Expect more breaches to be attributed to 3rd party negligence
•  Big enterprises to start paying attention to security posture of 3rd parties
–  Set up standards / guidelines / requirements
–  Transfer liability in the event of a breach
•  Cyber insurance companies to attempt to set guidelines for data security
–  Penetrate the smaller business market
–  Must come up with a good actuary model based on standardized mitigation requirements
24
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #4:
SSL More of a Problem than a Solution?
4
25
© 2015 Imperva, Inc. All rights reserved.
Subversion of Free SSL Certificates for Malware
26
© 2015 Imperva, Inc. All rights reserved.
Subversion of Free SSL Certificates for Malware
•  Easier to encrypt C&C communications
•  Fast flux DNS can now be used in conjunction with SSL
•  More certificates for more organizations = more opportunity for theft
–  More opportunity for impersonation and code signing
•  Free SSL certificates can significantly lower the cost of signed malware
–  Combined with automation will help them remain undetected
27
© 2015 Imperva, Inc. All rights reserved.
What (else) Could Possibly Go Wrong?
•  eDellRoot
•  Logjam
•  Schannel TLS Triple Handshake
Vulnerability - CVE-2015-6112
–  Add “Extended Master Secret”
•  Bar Mitzvah attack
–  RC4 under SSL is REALLY broken
•  SSL Pinning
–  Would invalidate NG Firewalls?
28
© 2015 Imperva, Inc. All rights reserved.
A Note on HTTP/2
•  Major complex revision of HTTP protocol
–  Keep semantics but replace everything under the hood
•  Intended for use over TLS
–  This part was not mandated by RFC but dictated by major browser vendors
•  Inconsistency between SPDY and HTTP/2 in the use of TLS extensions
•  New implementations that are not even based on the SPDY prototypes
•  Across all major servers and browsers
29
© 2015 Imperva, Inc. All rights reserved.
Our Predictions
•  Continuous growth in SSL implementation and design vulnerability flow
•  Increase in SSL usage and changes to CA infrastructure will benefit attackers
–  More attacks go undetected over network (SSL certificates)
–  More attacks go undetected inside end stations (code signing certificates)
•  New HTTP/2 vulnerability flow
–  We already have some in our lab
•  It’s going to be much worst before it becomes better
–  The foundation for secure traffic over the Internet must go through a drastic simplification
process
30
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #5:
Ransomware/Blackmail – Flourishing
Business
5
31
© 2015 Imperva, Inc. All rights reserved.
Ransomware Business on Personal Devices
32
© 2015 Imperva, Inc. All rights reserved.
Ransomware Business on Personal Devices
33
•  CryptoWall 4.0 – enhanced and harder to detect
•  Once data is encrypted, unfortunately, not many options
–  Standard modern encryption used in the proper way (i.e. cannot be broken)
–  Reformat and restore from backup
•  Authorities set the right atmosphere
–  “To be honest, we often advise people just to pay the ransom.” – Assistant Special Agent
in Charge of the FBI’s CYBER and Counterintelligence Program
–  The success of the ransomware ends up benefitting victims (same as above)
–  Ransoms are low. And most ransomware scammers are good to their word (guess who…)
•  Criminals are netting an estimated $150 million a year through these scams
(FBI)
© 2015 Imperva, Inc. All rights reserved.
Ransom/Blackmail on Enterprises
34
© 2015 Imperva, Inc. All rights reserved.
DDoS as a Service
35
© 2015 Imperva, Inc. All rights reserved.
DDoS as a Service
•  Ransoms with threats of DDoS Attacks
•  Based on low end DDoS as a Service Providers
•  Simple execution
–  Go online
–  Purchase a monthly package
–  Launch short attacks
–  Send email
–  Collect money
36
© 2015 Imperva, Inc. All rights reserved.
Our Predictions
•  Unless authorities step in this is going to grow
•  May spill into the ICS / SCADA domain
•  Some gangs may choose to go after bigger prey
37
© 2015 Imperva, Inc. All rights reserved.
Summary
6
38
© 2015 Imperva, Inc. All rights reserved.
Our 2016 Predictions
•  IoT will start taking its toll on enterprises and individuals
–  Botnet of things
–  Credential theft through insecure devices
•  Rise of insider threat
–  Dramatic growth in successful attacks of insider nature
–  Due to increased attack rate and lower detection rates
•  Attackers go down the food chain
–  Increased attacks on smaller companies
–  Increased liability will drive data security needs
39
© 2015 Imperva, Inc. All rights reserved.
Our 2016 Predictions (cont.)
•  Continuous decay in security value of SSL
–  Coupled with new opportunities for attackers to abuse growing use of SSL
–  HTTP/2 vulnerability flow
•  Ransom/Blackmail as a business model
–  Fast growth business
–  May affect larger organizations and other domains (ICS / SCADA)
40
© 2015 Imperva, Inc. All rights reserved.
Recommendations
•  Cyber space is not going to become more secure this year
•  Enterprises must continue to invest in securing themselves, this goes down to
the smaller enterprises as well
•  Attackers are after data. This is where enterprises should invest their efforts of
protection
•  Once inside the organization attackers are not “attacking” but rather “abusing”.
Look for solutions that detect abuse rather than attack
•  Look for security as an overlay solution
–  Databases cannot defend themselves
–  Applications are not self defending
–  Networks cannot be defended against DDoS from inside the network
41
Top Cyber Security Trends for 2016

More Related Content

What's hot

ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 

What's hot (20)

ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Topic11
Topic11Topic11
Topic11
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 

Similar to Top Cyber Security Trends for 2016

Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisNorth Texas Chapter of the ISSA
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Agedlblumen
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusImperva
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the UnionDavid Perkins
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskSurfWatch Labs
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...Citrin Cooperman
 

Similar to Top Cyber Security Trends for 2016 (20)

Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Cloud security
Cloud securityCloud security
Cloud security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 

More from Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 

More from Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Top Cyber Security Trends for 2016

  • 1. © 2015 Imperva, Inc. All rights reserved. Top Cyber Security Trends for 2016 Amichai Shulman, CTO, Imperva December 16, 2015
  • 2. © 2015 Imperva, Inc. All rights reserved. Amichai Shulman – CTO, Imperva •  Speaker at industry events –  RSA, Appsec, Info Security UK, Black Hat •  Lecturer on information security –  Technion - Israel Institute of Technology •  Former security consultant to banks and financial services firms •  Leads the Imperva Application Defense Center (ADC) –  Discovered over 20 commercial application vulnerabilities –  Credited by Oracle, MSSQL, IBM and Others 2 Amichai Shulman one of InfoWorld’s “Top 25 CTOs”
  • 3. © 2015 Imperva, Inc. All rights reserved. Agenda •  Introduction •  2015 Forecast Score Card •  2016 Cyber Security Trends •  Summary and Conclusion •  Q&A 3
  • 4. © 2015 Imperva, Inc. All rights reserved. 2015 Score Card 4 Trend Score 1 Targeted attacks change their nature   A 2 Patching is going to become impossible A- 3 DDoS is growing at the Internet rate A 4 SSL is at a tipping point A-
  • 5. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #1: IoT / BoT - Botnet of Things 1 5
  • 6. © 2015 Imperva, Inc. All rights reserved. BoT - Botnet of Things 6
  • 7. © 2015 Imperva, Inc. All rights reserved. Hacking the Fridge 7
  • 8. © 2015 Imperva, Inc. All rights reserved. Asking the Right Question •  Can someone hack my toaster? 8
  • 9. © 2015 Imperva, Inc. All rights reserved. Asking the Right Question •  Can someone hack my toaster? •  Can my network be attacked with a shoe? 9
  • 10. The Internet of Things A dramatic increase in networked devices leads to more opportunities for ATTACK The Internet of Things
  • 11. © 2015 Imperva, Inc. All rights reserved. BoT - Botnet of Things •  Connected IoT devices will never have “adequate” security –  Device take over –  Credential theft •  Botnets can grow larger undetected –  More opportunity – easier to form larger botnets –  More DDoS as a Service opportunity •  Possible increase in exposure from insiders –  BYOD on steroids –  Watch, wearables and others not as secure –  More compromised devices in the vicinity of enterprise networks 11
  • 12. © 2015 Imperva, Inc. All rights reserved. Our Prediction •  More people talking about the wrong problems •  More “IoT” based botnets •  More incidents to link personal credentials with IoT breaches •  Highly sensitive companies starting to feel the pressure (not until the end of the year) 12
  • 13. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #2: Rise of Insider Threat 2 13
  • 14. © 2015 Imperva, Inc. All rights reserved. Rise of Insider Threat 14 Globally 89% of respondents felt that their organization was now more at risk from an insider attack – Vormetric 2015 “55% of the Incidents from Internal Actors due to Privilege Abuse” -Verizon DBIR 2015
  • 16. © 2015 Imperva, Inc. All rights reserved. Outside In •  Personal attack surface is growing –  Social, mobile, IoE –  We are extremely exposed and extremely vulnerable •  Engaged employees are a two way sword –  Mix work and personal life –  Most infections happen during office hours, 20% of infected machines attributed to enterprise networks •  End stations are increasingly vulnerable –  Tracking the number of patched vulnerabilities in end point components suggests a growing backlog with a constant fixing capacity 16
  • 17. © 2015 Imperva, Inc. All rights reserved. Inside Out •  Shadow IT –  Unmanaged Database servers –  Partly commissioned SaaS applications •  More employees and more collaboration –  Barriers are taken down •  Shared data repositories with trusted partners •  Sensitive data is everywhere –  Cloud applications provide direct access without IT control –  Big data lakes –  1000s of “traditional” databases 17
  • 18. © 2015 Imperva, Inc. All rights reserved. Our Predictions •  Decrease in detection rates –  Most solutions look for the tools and not the attack –  Attackers have all the infrastructure in place to evade ANY solution that takes the above approach •  Increase in absolute number of attacks of internal nature •  Large increase in total number and percentage of incidents of internal nature 18
  • 19. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #3: Data Security for the Big and Small 3 19
  • 20. © 2015 Imperva, Inc. All rights reserved. Big Breaches = Big Price Tag •  Cost of data breach is higher than anticipated –  Target’s gross breach expenses totaled $252 million, insurance compensation brought that down to $162 million –  Home Depot expects $100 million in insurance payments toward $232 million in expenses from its 2014 breach –  Anthem breach expected to cost more than $100 millions 20
  • 21. © 2015 Imperva, Inc. All rights reserved. Big Breaches Start Small •  Target breach started with a compromised HVAC company •  T-Mobile customer data breached through Experian •  JPMC customer data breached after an affiliate was breached •  Lockheed Martin breach through RSA 21
  • 22. © 2015 Imperva, Inc. All rights reserved. Smaller Companies are Targets •  While sophisticated, targeted attacks do exists they are a negligible minority •  80% of infections stem from massive eMail campaigns •  Smaller organizations are infected and compromised as much as larger ones (or even more) •  Attackers are aware of 3rd party relationships between large targets and smaller service providers •  Transfer of liabilities may prove to be devastating for a smaller 3rd party 22
  • 23. © 2015 Imperva, Inc. All rights reserved. Cyber Insurance is Not a Silver Bullet •  Big breaches leave some of the costs uncovered •  Insurance claims result in higher policy costs in the future –  “Health insurers who suffered hacks are facing the most extreme increases, with some premiums tripling at renewal time” - Bob Wice, a leader of Beazley Plc's cyber insurance practice •  Policy cost is detrimental for smaller business –  Insurers are not proficient yet in assessing the risks –  May consider making coverage conditional on a full and frequent assessment of policyholder vulnerabilities (PwC Research) –  Especially true for 3rd party liabilities 23
  • 24. © 2015 Imperva, Inc. All rights reserved. Our Predictions •  Continuing on our previous prediction – smaller organizations are going to continue falling prey in larger numbers •  Expect more breaches to be attributed to 3rd party negligence •  Big enterprises to start paying attention to security posture of 3rd parties –  Set up standards / guidelines / requirements –  Transfer liability in the event of a breach •  Cyber insurance companies to attempt to set guidelines for data security –  Penetrate the smaller business market –  Must come up with a good actuary model based on standardized mitigation requirements 24
  • 25. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #4: SSL More of a Problem than a Solution? 4 25
  • 26. © 2015 Imperva, Inc. All rights reserved. Subversion of Free SSL Certificates for Malware 26
  • 27. © 2015 Imperva, Inc. All rights reserved. Subversion of Free SSL Certificates for Malware •  Easier to encrypt C&C communications •  Fast flux DNS can now be used in conjunction with SSL •  More certificates for more organizations = more opportunity for theft –  More opportunity for impersonation and code signing •  Free SSL certificates can significantly lower the cost of signed malware –  Combined with automation will help them remain undetected 27
  • 28. © 2015 Imperva, Inc. All rights reserved. What (else) Could Possibly Go Wrong? •  eDellRoot •  Logjam •  Schannel TLS Triple Handshake Vulnerability - CVE-2015-6112 –  Add “Extended Master Secret” •  Bar Mitzvah attack –  RC4 under SSL is REALLY broken •  SSL Pinning –  Would invalidate NG Firewalls? 28
  • 29. © 2015 Imperva, Inc. All rights reserved. A Note on HTTP/2 •  Major complex revision of HTTP protocol –  Keep semantics but replace everything under the hood •  Intended for use over TLS –  This part was not mandated by RFC but dictated by major browser vendors •  Inconsistency between SPDY and HTTP/2 in the use of TLS extensions •  New implementations that are not even based on the SPDY prototypes •  Across all major servers and browsers 29
  • 30. © 2015 Imperva, Inc. All rights reserved. Our Predictions •  Continuous growth in SSL implementation and design vulnerability flow •  Increase in SSL usage and changes to CA infrastructure will benefit attackers –  More attacks go undetected over network (SSL certificates) –  More attacks go undetected inside end stations (code signing certificates) •  New HTTP/2 vulnerability flow –  We already have some in our lab •  It’s going to be much worst before it becomes better –  The foundation for secure traffic over the Internet must go through a drastic simplification process 30
  • 31. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #5: Ransomware/Blackmail – Flourishing Business 5 31
  • 32. © 2015 Imperva, Inc. All rights reserved. Ransomware Business on Personal Devices 32
  • 33. © 2015 Imperva, Inc. All rights reserved. Ransomware Business on Personal Devices 33 •  CryptoWall 4.0 – enhanced and harder to detect •  Once data is encrypted, unfortunately, not many options –  Standard modern encryption used in the proper way (i.e. cannot be broken) –  Reformat and restore from backup •  Authorities set the right atmosphere –  “To be honest, we often advise people just to pay the ransom.” – Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program –  The success of the ransomware ends up benefitting victims (same as above) –  Ransoms are low. And most ransomware scammers are good to their word (guess who…) •  Criminals are netting an estimated $150 million a year through these scams (FBI)
  • 34. © 2015 Imperva, Inc. All rights reserved. Ransom/Blackmail on Enterprises 34
  • 35. © 2015 Imperva, Inc. All rights reserved. DDoS as a Service 35
  • 36. © 2015 Imperva, Inc. All rights reserved. DDoS as a Service •  Ransoms with threats of DDoS Attacks •  Based on low end DDoS as a Service Providers •  Simple execution –  Go online –  Purchase a monthly package –  Launch short attacks –  Send email –  Collect money 36
  • 37. © 2015 Imperva, Inc. All rights reserved. Our Predictions •  Unless authorities step in this is going to grow •  May spill into the ICS / SCADA domain •  Some gangs may choose to go after bigger prey 37
  • 38. © 2015 Imperva, Inc. All rights reserved. Summary 6 38
  • 39. © 2015 Imperva, Inc. All rights reserved. Our 2016 Predictions •  IoT will start taking its toll on enterprises and individuals –  Botnet of things –  Credential theft through insecure devices •  Rise of insider threat –  Dramatic growth in successful attacks of insider nature –  Due to increased attack rate and lower detection rates •  Attackers go down the food chain –  Increased attacks on smaller companies –  Increased liability will drive data security needs 39
  • 40. © 2015 Imperva, Inc. All rights reserved. Our 2016 Predictions (cont.) •  Continuous decay in security value of SSL –  Coupled with new opportunities for attackers to abuse growing use of SSL –  HTTP/2 vulnerability flow •  Ransom/Blackmail as a business model –  Fast growth business –  May affect larger organizations and other domains (ICS / SCADA) 40
  • 41. © 2015 Imperva, Inc. All rights reserved. Recommendations •  Cyber space is not going to become more secure this year •  Enterprises must continue to invest in securing themselves, this goes down to the smaller enterprises as well •  Attackers are after data. This is where enterprises should invest their efforts of protection •  Once inside the organization attackers are not “attacking” but rather “abusing”. Look for solutions that detect abuse rather than attack •  Look for security as an overlay solution –  Databases cannot defend themselves –  Applications are not self defending –  Networks cannot be defended against DDoS from inside the network 41