SlideShare a Scribd company logo
1 of 45
Download to read offline
Top Security
                              Threats
                             for 2011
Thursday, March 31, 2011
Presenter

                                Eric Kitchens, CISSP/CISA
                                  eric@thegarlandgroup.net




Thursday, March 31, 2011
riskkey.com




                 • IT Audit / Security Testing
                 • Continuous Compliance
                 • Collaboration Consulting




Thursday, March 31, 2011
What Are The
                           Top Security Threats
                                for 2011?


Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.


                       New and emerging threats often are combinations of “old” threats.




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.


                       New and emerging threats often are combinations of “old” threats.


                                         It’s never too late to mitigate.



Thursday, March 31, 2011
Something Old...
                           Threats that have been with us for many years
                              and will be with us for years to come.




Thursday, March 31, 2011
Something Old...
                           Threats that have been with us for many years
                              and will be with us for years to come.


                 • Mobile Devices




Thursday, March 31, 2011
Something Old...
                            Threats that have been with us for many years
                               and will be with us for years to come.


                 • Mobile Devices
                  • Cloud Computing & Virtualization



Thursday, March 31, 2011
Something Old...
                            Threats that have been with us for many years
                               and will be with us for years to come.


                 • Mobile Devices
                  • Cloud Computing & Virtualization
                  • Application Vulnerabilities

Thursday, March 31, 2011
Mobile Devices




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore
           • Merging Business & Personal Use



Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore
           • Merging Business & Personal Use
           • Lost or Stolen Devices & Data

Thursday, March 31, 2011
Cloud Computing




Thursday, March 31, 2011
Cloud Computing

              • Expanding Scope of Virtualization




Thursday, March 31, 2011
Cloud Computing

              • Expanding Scope of Virtualization
              • Outsourced Applications and Services



Thursday, March 31, 2011
Application Vulnerabilities




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing
                  • Application Specific Vulnerabilities are on the Rise




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing
                  • Application Specific Vulnerabilities are on the Rise
                  • Evaluate Automated Patching Tools for All Applications & Systems



Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems




Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats




Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats
              • Hacktivisim



Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats
              • Hacktivisim
              • Cyberterrorism


Thursday, March 31, 2011
Advanced Persistent Threats




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time
                  • Adapts to Defenses and Mitigation Strategies



Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time
                  • Adapts to Defenses and Mitigation Strategies
                  • Baselining and Monitoring are Essential for Defense

Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes
                • Tools are Freely Available to Non-Technical Users



Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes
                • Tools are Freely Available to Non-Technical Users
                • Be Aware of Outsourced Relationships and
                       Higher Risk Customers They Service


Thursday, March 31, 2011
Something Borrowed...




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats
                       • Data Classification and Control



Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats
                       • Data Classification and Control
                       • USB Storage Devices

Thursday, March 31, 2011
Questions & Answers




Thursday, March 31, 2011
Thanks.
                           Email: eric@thegarlandgroup.net

                           Web: http://www.thegarlandgroup.net




Thursday, March 31, 2011

More Related Content

Similar to Garland Group - Top Security Threats of 2011

Android Apps Success and Store trend
Android Apps Success and Store trendAndroid Apps Success and Store trend
Android Apps Success and Store trend01Booster
 
Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience Erik Eliason
 
Critical aspects of digital tools in learning processes during the near future
Critical aspects of digital tools in learning processes  during the near futureCritical aspects of digital tools in learning processes  during the near future
Critical aspects of digital tools in learning processes during the near futureTeemu Leinonen
 
Social Media-Interacting With Your Stakeholders
Social Media-Interacting With Your StakeholdersSocial Media-Interacting With Your Stakeholders
Social Media-Interacting With Your StakeholdersReginaPhelps
 
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011Seismonaut
 
Information Visualization
Information VisualizationInformation Visualization
Information VisualizationPeter Dalsgaard
 

Similar to Garland Group - Top Security Threats of 2011 (7)

Android Apps Success and Store trend
Android Apps Success and Store trendAndroid Apps Success and Store trend
Android Apps Success and Store trend
 
Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience
 
Critical aspects of digital tools in learning processes during the near future
Critical aspects of digital tools in learning processes  during the near futureCritical aspects of digital tools in learning processes  during the near future
Critical aspects of digital tools in learning processes during the near future
 
Social Media-Interacting With Your Stakeholders
Social Media-Interacting With Your StakeholdersSocial Media-Interacting With Your Stakeholders
Social Media-Interacting With Your Stakeholders
 
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
 
Information Visualization
Information VisualizationInformation Visualization
Information Visualization
 
Social Media Evolved
Social Media EvolvedSocial Media Evolved
Social Media Evolved
 

More from Brad Garland

ICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial ServicesICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial ServicesBrad Garland
 
FFIEC Regulatory Training
FFIEC Regulatory TrainingFFIEC Regulatory Training
FFIEC Regulatory TrainingBrad Garland
 
Next Generation Banking with Generation Y
Next Generation Banking with Generation YNext Generation Banking with Generation Y
Next Generation Banking with Generation YBrad Garland
 
Banking on Social Media
Banking on Social MediaBanking on Social Media
Banking on Social MediaBrad Garland
 
Web2.0 and your Bank - The Consumers
Web2.0 and your Bank - The ConsumersWeb2.0 and your Bank - The Consumers
Web2.0 and your Bank - The ConsumersBrad Garland
 
Web 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The TechnologyWeb 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The TechnologyBrad Garland
 

More from Brad Garland (7)

ICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial ServicesICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial Services
 
Community Is King
Community Is KingCommunity Is King
Community Is King
 
FFIEC Regulatory Training
FFIEC Regulatory TrainingFFIEC Regulatory Training
FFIEC Regulatory Training
 
Next Generation Banking with Generation Y
Next Generation Banking with Generation YNext Generation Banking with Generation Y
Next Generation Banking with Generation Y
 
Banking on Social Media
Banking on Social MediaBanking on Social Media
Banking on Social Media
 
Web2.0 and your Bank - The Consumers
Web2.0 and your Bank - The ConsumersWeb2.0 and your Bank - The Consumers
Web2.0 and your Bank - The Consumers
 
Web 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The TechnologyWeb 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The Technology
 

Recently uploaded

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

Garland Group - Top Security Threats of 2011

  • 1. Top Security Threats for 2011 Thursday, March 31, 2011
  • 2. Presenter Eric Kitchens, CISSP/CISA eric@thegarlandgroup.net Thursday, March 31, 2011
  • 3. riskkey.com • IT Audit / Security Testing • Continuous Compliance • Collaboration Consulting Thursday, March 31, 2011
  • 4. What Are The Top Security Threats for 2011? Thursday, March 31, 2011
  • 5. Something Old, Something New, Something Borrowed... Thursday, March 31, 2011
  • 6. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. Thursday, March 31, 2011
  • 7. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. New and emerging threats often are combinations of “old” threats. Thursday, March 31, 2011
  • 8. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. New and emerging threats often are combinations of “old” threats. It’s never too late to mitigate. Thursday, March 31, 2011
  • 9. Something Old... Threats that have been with us for many years and will be with us for years to come. Thursday, March 31, 2011
  • 10. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices Thursday, March 31, 2011
  • 11. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices • Cloud Computing & Virtualization Thursday, March 31, 2011
  • 12. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices • Cloud Computing & Virtualization • Application Vulnerabilities Thursday, March 31, 2011
  • 14. Mobile Devices • Various Platforms Thursday, March 31, 2011
  • 15. Mobile Devices • Various Platforms • Mal-Ware in the AppStore Thursday, March 31, 2011
  • 16. Mobile Devices • Various Platforms • Mal-Ware in the AppStore • Merging Business & Personal Use Thursday, March 31, 2011
  • 17. Mobile Devices • Various Platforms • Mal-Ware in the AppStore • Merging Business & Personal Use • Lost or Stolen Devices & Data Thursday, March 31, 2011
  • 19. Cloud Computing • Expanding Scope of Virtualization Thursday, March 31, 2011
  • 20. Cloud Computing • Expanding Scope of Virtualization • Outsourced Applications and Services Thursday, March 31, 2011
  • 22. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing Thursday, March 31, 2011
  • 23. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing • Application Specific Vulnerabilities are on the Rise Thursday, March 31, 2011
  • 24. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing • Application Specific Vulnerabilities are on the Rise • Evaluate Automated Patching Tools for All Applications & Systems Thursday, March 31, 2011
  • 25. Something New... Not “new” but emerging and evolving into new problems Thursday, March 31, 2011
  • 26. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats Thursday, March 31, 2011
  • 27. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats • Hacktivisim Thursday, March 31, 2011
  • 28. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats • Hacktivisim • Cyberterrorism Thursday, March 31, 2011
  • 30. Advanced Persistent Threats • Google and RSA Are Recent Examples Thursday, March 31, 2011
  • 31. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time Thursday, March 31, 2011
  • 32. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time • Adapts to Defenses and Mitigation Strategies Thursday, March 31, 2011
  • 33. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time • Adapts to Defenses and Mitigation Strategies • Baselining and Monitoring are Essential for Defense Thursday, March 31, 2011
  • 35. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. Thursday, March 31, 2011
  • 36. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes Thursday, March 31, 2011
  • 37. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes • Tools are Freely Available to Non-Technical Users Thursday, March 31, 2011
  • 38. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes • Tools are Freely Available to Non-Technical Users • Be Aware of Outsourced Relationships and Higher Risk Customers They Service Thursday, March 31, 2011
  • 40. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” Thursday, March 31, 2011
  • 41. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats Thursday, March 31, 2011
  • 42. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats • Data Classification and Control Thursday, March 31, 2011
  • 43. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats • Data Classification and Control • USB Storage Devices Thursday, March 31, 2011
  • 45. Thanks. Email: eric@thegarlandgroup.net Web: http://www.thegarlandgroup.net Thursday, March 31, 2011