6. Something Old, Something New,
Something Borrowed...
Threats that were big news in the past are still out there.
Thursday, March 31, 2011
7. Something Old, Something New,
Something Borrowed...
Threats that were big news in the past are still out there.
New and emerging threats often are combinations of “old” threats.
Thursday, March 31, 2011
8. Something Old, Something New,
Something Borrowed...
Threats that were big news in the past are still out there.
New and emerging threats often are combinations of “old” threats.
It’s never too late to mitigate.
Thursday, March 31, 2011
9. Something Old...
Threats that have been with us for many years
and will be with us for years to come.
Thursday, March 31, 2011
10. Something Old...
Threats that have been with us for many years
and will be with us for years to come.
• Mobile Devices
Thursday, March 31, 2011
11. Something Old...
Threats that have been with us for many years
and will be with us for years to come.
• Mobile Devices
• Cloud Computing & Virtualization
Thursday, March 31, 2011
12. Something Old...
Threats that have been with us for many years
and will be with us for years to come.
• Mobile Devices
• Cloud Computing & Virtualization
• Application Vulnerabilities
Thursday, March 31, 2011
14. Mobile Devices
• Various Platforms
Thursday, March 31, 2011
15. Mobile Devices
• Various Platforms
• Mal-Ware in the AppStore
Thursday, March 31, 2011
16. Mobile Devices
• Various Platforms
• Mal-Ware in the AppStore
• Merging Business & Personal Use
Thursday, March 31, 2011
17. Mobile Devices
• Various Platforms
• Mal-Ware in the AppStore
• Merging Business & Personal Use
• Lost or Stolen Devices & Data
Thursday, March 31, 2011
23. Application Vulnerabilities
• Operating System Vulnerabilities are Decreasing
• Application Specific Vulnerabilities are on the Rise
Thursday, March 31, 2011
24. Application Vulnerabilities
• Operating System Vulnerabilities are Decreasing
• Application Specific Vulnerabilities are on the Rise
• Evaluate Automated Patching Tools for All Applications & Systems
Thursday, March 31, 2011
25. Something New...
Not “new” but emerging and evolving into new problems
Thursday, March 31, 2011
26. Something New...
Not “new” but emerging and evolving into new problems
• Advanced Persistent Threats
Thursday, March 31, 2011
27. Something New...
Not “new” but emerging and evolving into new problems
• Advanced Persistent Threats
• Hacktivisim
Thursday, March 31, 2011
28. Something New...
Not “new” but emerging and evolving into new problems
• Advanced Persistent Threats
• Hacktivisim
• Cyberterrorism
Thursday, March 31, 2011
31. Advanced Persistent Threats
• Google and RSA Are Recent Examples
• Executed Over Extended Period of Time
Thursday, March 31, 2011
32. Advanced Persistent Threats
• Google and RSA Are Recent Examples
• Executed Over Extended Period of Time
• Adapts to Defenses and Mitigation Strategies
Thursday, March 31, 2011
33. Advanced Persistent Threats
• Google and RSA Are Recent Examples
• Executed Over Extended Period of Time
• Adapts to Defenses and Mitigation Strategies
• Baselining and Monitoring are Essential for Defense
Thursday, March 31, 2011
35. Cyber-Terrorism & Hacktivism
• DoS of Visa and MasterCard from WikiLeaks Supporters
are Prime Examples.
Thursday, March 31, 2011
36. Cyber-Terrorism & Hacktivism
• DoS of Visa and MasterCard from WikiLeaks Supporters
are Prime Examples.
• Disrupting Services for Ideological Purposes
Thursday, March 31, 2011
37. Cyber-Terrorism & Hacktivism
• DoS of Visa and MasterCard from WikiLeaks Supporters
are Prime Examples.
• Disrupting Services for Ideological Purposes
• Tools are Freely Available to Non-Technical Users
Thursday, March 31, 2011
38. Cyber-Terrorism & Hacktivism
• DoS of Visa and MasterCard from WikiLeaks Supporters
are Prime Examples.
• Disrupting Services for Ideological Purposes
• Tools are Freely Available to Non-Technical Users
• Be Aware of Outsourced Relationships and
Higher Risk Customers They Service
Thursday, March 31, 2011
40. Something Borrowed...
“I swear, I meant to return all the confidential data on my USB drive
after I was done ‘borrowing’ it!”
Thursday, March 31, 2011
41. Something Borrowed...
“I swear, I meant to return all the confidential data on my USB drive
after I was done ‘borrowing’ it!”
• Insider Threats
Thursday, March 31, 2011
42. Something Borrowed...
“I swear, I meant to return all the confidential data on my USB drive
after I was done ‘borrowing’ it!”
• Insider Threats
• Data Classification and Control
Thursday, March 31, 2011
43. Something Borrowed...
“I swear, I meant to return all the confidential data on my USB drive
after I was done ‘borrowing’ it!”
• Insider Threats
• Data Classification and Control
• USB Storage Devices
Thursday, March 31, 2011