SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
4/27/2011




                                The Future
                                of Security




                                         David Smith
                                         CEO  HBMGInc.
                                         dsmith@HBMGINC.com
                                         linkedin.com/in/davidsmithaustin




Why is Security Hard?
No system can be 100% secure
    – Reality is risk mitigation, not risk avoidance


Difficult to prove good security
    – Bad security gets proven for us!


Good security and no security can look the same
    – How does one know how secure they are?


Many things to secure
    – People, equipment, OS, network, Application Servers,
      applications, phones, and databases




                                                                                   1
4/27/2011




    Balancing the Business

           Usability




               x




Security               Performance




                                            2
4/27/2011




Challenges in the 21st century
                        Information
           Safety &       Explosion     Knowledge
           Security                       Economy


  Accelerating                               Globalization
  Change
                                                International
                                                Partnerships
Complex
Technologies
                                              Finite
    Diverse                                   Resources
  Workforce

                                         Sustainable
            Life-Long                    Development
            Learning       Citizen
                           Engagement




                                                    Copyright, 2008 © HBMG, Inc.




                                                                                          3
4/27/2011




        The Growth Of Complexity
                                                Higher
                                               Technical
                                              Complexity

                                                                         DOD
                                                                         weapon
                          Embedded                                       system
                          automotive                    Telecom switch             National Air
                          application     Commercial                               Traffic Control
                                          compiler                                 System

  Lower                                                                                        Higher
Management                                                                                   Management
Complexity                                                      Large-scale
                                                                simulation
                                                                                             Complexity
                        Small
                        scientific                     Enterprise
                        simulation      Enterprise     information
                                        application    systems           DOD
                                                                         management
                                                                         information
                                                                         system
                Business
                spreadsheet
                                               Lower
                                              Technical
                                             Complexity


  HBMG Inc. Copyright
  2009




      Mega Trends to Consider…
       •    Digitization of all content (listening = getting!)
       •    Distribution is the default (just having a network
            won’t be enough)
       •    Virtualization (location matters less and less)
       •    Niche-ization of content & lifestyles
       •    Mass-Personalization of media will become
            standard
       •    Democratization of creation, & peer production
       •    Amateurization of the entire value chain (but
            NOT to the detriment of experts)
       •    “Godzilla-zation” of users/consumers
                                                                                           Copyright, 2008 © HBMG, Inc.




                                                                                                                                 4
4/27/2011




      Major Trends for Software Process
     • System of systems is becoming more complex
     • Increasing software criticality and need for
       dependability
     • Increasing emphasis on end users – both
       inside and outside the enterprise
     • Decreasing value of IT
     • Geography doesn’t matter
     • The fabric of software and computing is
       evolving
          • Continuous integration - continuous delivery – group mind
          • Increasing software autonomy
          • Combination of biology and computing

                          Copyright, 2009 © HBMG, Inc.




      The Limits of Technology
                                                         Fundamental
       The laws of physics

       The laws of software

       The challenge of algorithms

       The difficulty of distribution

       The problems of design

       The importance of organization

       The impact of economics

       The influence of politics

       The limits of human imagination
HBMG Inc. Copyright                                        Human
2009




                                                                               5
4/27/2011




           Vertical Convergence with an
           Industry

     Technology:                Telecom:              Network:                   Content:            Entertainment:
   • Computers &         • Communication        • Networking / IP           • Media & New            • Broadcasting
     Peripherals
         p                 Equipment
                            q p                   Networking
                                                           g
                                                                            • Media                  • Film
   • Semi-               • Service              • Service
     conductors            Providers:             Providers:                • Advertising            • Music
   • Internet apps           Telephone/            Internet Service         • Printing,      • Gaming
                             Voice & Data          Providers                  Publishing and
   • Software                                                                                • Sports
                                                                              Newspapers
                             Mobile Wireless/      Broadband
   • Internet
                             Voice & Data
     devices                                       Satellite
                                                   Broadcast Cable




                                                                                                      Copyright, 2008 © HBMG, Inc.




          Horizontally Across Different Industry
          Sectors:

                    Technology:          Telecom:                 Network:             Content:           Entertainment
                  Computers &         Communication            Networking/         Media &                Broadcasting
Design                                Equipment                IP Networking       New Media              Film
                  Peripherals

                  Semiconductors      Service                  Service
Content                                                                            Advertising            Music
                                      Providers:               Providers:

                                      Telephone/                                   Printing, Publishing
Manufacturing     Internet apps                                ISP(s)              & Newspapers           Gaming
                                      Voice & Data

                  Software            Mobile Wireless/
Infrastructure                                                 Broadband                                  Sports
                                      Voice & Data

Services          Internet devices                             Satellite


                                                               Broadcast Cable
Software


Devices


Distribution

                                                                                                      Copyright, 2008 © HBMG, Inc.




                                                                                                                                            6
4/27/2011




    Convergence reduces costs and risks

   Security
Information &
                                               Systems
    Events



                     Comprehensive
                       Security &
                      Compliance




                Identity & Access Privileges




                                                                7
4/27/2011




       Change, Uncertainty, and Complexity
                     Economic & Financial       Virtual Worlds
   Technology
   Acceleration                              Cyber Warfare
Russia - China                                     Intangible
     K-12 Science                                    Capital
     & Math Crisis                            Pandemic

Terrorism                                          Global Talent
                                                    Explosion
      Offshore
     Competition
         p                                    English as 2nd
3 Billion New                                    Demographics
  Capitalists
                                              Economic Unions
   Flat Wages        Regional Economic      End of Moore’s Law
                        Dislocation




     New Economic Superpowers in 2050?




                                                                          8
4/27/2011




  Innovation is Accelerating




The “Fat Pipe”




                                      9
4/27/2011




                                                   Growth of Broadband Users
                                                                    4,000

                                                                    3,500

                                                                    3,000
                                                Millions of Users


                                                                    2,500                                   Cellular
                                                                                                          Subscribers
                                                                    2,000




                                                                                                                                                                                                                  World Broadband 20
                                                                    1,500                                                                                                               Broadband
                                                                                                                                                                                          Users
                                                                    1,000
                                                                                                                                                                                 Internet
                                                                     500                                                                                                          Users




                                                                                                                                                                                                                                   005
                                                                       0
                                                                       1990        1995                 2000                            2005                                 2010           2015            2020
                                               Historical Data Source: ITU                                                              Year                                Source: Technology Futures, Inc.




                                                                                                                                                                                                          Copyright, 2008 © HBMG, Inc.




                                               Regional Forecasts—Broadband
                                      500                                                                                                                            100%
  Millions of Broadband Subscribers




                                                                                                                                                                            Broadband
                                      450   Broadband                                                                                                                90%
                                                                                                                                                          useholds




                                      400                                                                                                                            80%            Korea
                                      350                                                   AP                                                                       70%
                                                                                                                                                                                                            Europe
                                                                                                                                          Percentage of Hou




                                      300                                                                                                                            60%                    NA
                                                                                             Europe                                                                                                                                         SA
                                      250                                                                                                                            50%
                                                                                                                                                                                                                                                       World Broadband 2005
                                                                                                                 World Broadband 2006




                                                                                                     Korea
                                      200                                                                                                                            40%                                                                        AP
                                                                                          NA
                                      150                                                                                                                            30%
                                      100                                                                                                                            20%
                                                                                             SA      MA                                                                                                                                     MA
                                      50                                                                                                                             10%
                                        0                                                                                                                             0%
                                        1995       2000              2005   2010   2015          2020        2025                                                       1995     2000    2005      2010        2015                      2020        2025
Historical Data Source: ITU                                                 Year   Source: Technology Futures, Inc.                     Historical Data Source: ITU                                Year      Source: Technology Futures, Inc.




                                        The first looking at millions of broadband subscribers, and the second
                                        looking at the penetration.




                                                                                                                                                                                                                                                                                    10
4/27/2011




  Fixed Mobile Convergence

The latest buzzword in the
  collaborative industry is fixed
  mobile convergence (FMC) the
      bil                (FMC), th
  integration of wire line and wireless
  technologies to provide users with
  a seamless communication
  environment.




                                                11
4/27/2011




     Wireless Broadband Changes
     Everything….
Habits and behaviors sometimes change quickly:
 Once you had a great (and affordable) experience with new technology, you usually
 don’t want to miss it anymore.
 See: Blackberry iPod Skype in flight Wi Fi HD radio
       Blackberry, iPod, Skype, in-flight Wi-Fi, radio…

Wireless enables two-way, personalized media
 (as opposed to mass media)
Mobile content access will dwarf desktop-based access 10:1
In wireless broadband, interaction takes on a whole new meaning:
   – “Sharing” will become a default standard
   – Multimedia communications will abound (messages, video, photo, sound)
   – Games become all-pervasive (posing other problems)
   – Shared content creation is now “on the fly” (contributing, remixing, mashing, etc.)
   – Location-based CONTENT services will explode

Receivers become senders too                                          Copyright, 2008 © HBMG, Inc.




     “Mobile phones are more than a billion smart
     computers we can’t ignore that may create a
     software spiral like that of PC over the next 10
     years.”
                                                      —Paul Otellini, CEO, Intel




     “We really believe we are on the cusp of a
     whole new era of mobile computing ”
                              computing.
                                               —Steve Ballmer, CEO, Microsoft




                                                                      Copyright, 2008 © HBMG, Inc.




                                                                                                           12
4/27/2011




Top Ten Attacks
•   Trusted Website attacks
•   Effectiveness in Botnets
•   Data Loss – Phishing
•   Mobile phone threats (iphones)
•   Insider attacks
•   Identity Theft
•   Malicious Spyware
•   Web Application Security Exploits
•   VoIP event Phishing
•   Supply Chain Attacks




Pillars of Information Protection

                        Pillars of Information Protection
       Secure Systems
       S




                                In




                                                         Network Security
                                                         N




                                                                            Physical Security
                                                                            P
                                 nformation Managemen
                                                    nt




                                                                                                      13
4/27/2011




 Threats and Vulnerabilities
– What’s at Stake
  • Critical Infrastructures
  • Key Resources
  • New Resources
– The Case for Action
  •   Cyber Threats
  •   Insider Threats
  •   External Threats
  •   Cyber Terrorism
  •   Physical Attacks

                               Security Incident Trend, 1995–2003 (CERT/CC)


                                                                          27




 What kind of threats are there?

External threats         Internal threats
  –   Malware              – User response to unsolicited
  –   Rootkits               email or instant messages
  –   Adware               – May have a network that is
  –   Spam                   difficult to maintain
  –   Phishing             – “The Enemy Within” – The
                             code for malware isn’t
  –   “Ransomware”           p
                             particularly difficult to find
                                         y
                             and launch.




                                                                                     14
4/27/2011




     Threat numbers - Malware
     5500 new malicious software threats per month




     Attack Trends                        Data Breaches
     Information on data breaches that could lead to identity theft.
     The Education sector accounted for the majority of data breaches with 30%,
     followed by Government (26%) and Healthcare (15%) - almost half of
     breaches (46%) were due to theft or loss with hacking only accounting for
     16%.
     16%
     Hacking resulted in 73% of identities being exposed




30




                                                                                        15
4/27/2011




    IT Trends

                                                                                Ubiquitous



                                                                 Cloud
                                                                                 Virtualization


                                                   Grid      Internet            Appliances
                                                              WEB
                                   Client
                                   Server   Network




    Punch             Mainframe/
     Card              Midrange




     1960         1970               1980   1990          2000           2010      2020



HBMG Inc. Copyright
2009




      Top 10 Programming Languages




                                                                                                        16
4/27/2011




Programming Trends




   Source: Tiobe Software Aug. 2010




Programming Community Index for August 2010




                                                    17
4/27/2011




                Entry points - email - social
                engineering
           Security patch
           Famous person photo
                    p      p
           Anti-virus program
           Mp3,video
           Computer game
           “Cracked” software
           Serial numbers file
           Electronic postcard




                                                       Satellite Radio
                   Wireless TV                           Receivers       Wireless Cameras
                    Monitors
                                                                                                                     PDAs
                                   Digital Cameras
                                                                                     Digital Video Adapters

Digital Music
Adapters

                                                     Smart Phones
                                                                         Game Consoles
                                                                                                      Desktop PCs

        Smart Displays        Networked Storage
                                  Centers

                                                     Laptop PCs

                Networked DVD Player                                     Wireless Gaming      Mobile Gaming
                                                                             Adapters         Devices

                                            “Fourth Generation”
 Movies-on-Demand                              Set-top Boxes
     Receivers
                                                                                    802.11 Speakers
                         Digital Media Receivers                  Personal Video                        MP3 Players
                                                                    Recorders                   Copyright, 2008 © HBMG, Inc.




                                                                                                                                     18
4/27/2011




                                                                                        Ubiquitous
                                                                                        Computing
                                                                          Mobile
                                                                  Peer-to-Peer

                                                        Internet/Network
                                                        Computing
                                            Client/Server
                                            Computing
Complexity

                          Mainframe/
                          Midrange
                          Computing
             Punch Card
             Computing


        1960          1970         1980         1990       2000             2010     2020 2025
                Department              Intra-         Extra-          Personal Anytime-
              Process Centered        Enterprises    Enterprises                 Anywhere

                                                                                     Copyright, 2008 © HBMG, Inc.




        INFOSEC Research Council's
         “Hard Problems” list
     1. Global-Scale Identity – Identification required to produce an infrastructure capable of and
     reliable for commercial and national security purposes
     2. Insider Threat – All security technologies and approaches rely practically on modeled
     behavior of external bad actors. This runs contrary to a majority of the security data, which
     shows damaged caused by insiders to be orders of magnitude more frequent and costly
     3. Availability of Time-Critical Systems – Implementing effective security for systems where
     timeliness, performance and availability are higher priority services than security (i.e. control
     systems)
     4. Scalable Secure Systems – The development of large-scale secure systems where individual
     components or dependencies may be flawed or compromised
     5. Situational Understanding and Attack Attribution – Determining the current state of security
     for large scale and complex systems and being able to conduct assessments and provide
     attribution for security incidents
     6. Information Provenance – Developing systems and methods to determine and manage the
     integrity of information and information systems
     7. Security with Privacy – Designing methods and processes to improve security while
     preserving or enhancing privacy through granularity of activities and systems improvements
     8. Enterprise-Level Security Metrics –Scalable methods to determine or represent security or risk
     are needed in order to optimize resource allocation and decision making.




                                                                                                                          19
4/27/2011




        Security is a System


                SECURITY


  Product                               Configuration                     Implementation



  Policy and Process




        SOA Reference Architecture

                                            Browsers                       Voice      User Interface
                                                                                                       Policy, Process, Monitoring, Reporting, Usage Tracking




Users          Channel          PC   PDA     Cell Phone   IPhone          IVR
                                                                                                                                                            Se




                                             Portals / Websites                            User
                                                                                                                                                             ecurity, Operations, & Gov




Access Points            Web Applications      ASP JSP HTML        CSS Voice/XML       Interactions

                          Orchestrated Web Services                                Business Process
Service                   Service Discovery
Management
                          Service Transformations                                      Messaging
“Enterprise               Service Mediation, Routing, Logging, Auditing               Management
Service Bus”
        Bus”
                          Identity Policy Enforcement
“Service Registry”
         Registry”                                                                   Authentication
                          Single Sign-On

Web                            Atomic          Composite           Federated            Business
                                                                                                                                                                                      vernance
                                                                                                                                             ,




Services                                      Data Access                              Logic/Rules

                                                                                      System
Platform           Mainframe UNIX Windows .NET Java J2EE COBOL CICS
                                                                                    Administration
                                                                                       Network
Network          Firewalls Routers XML Accelerators Proxy Servers TCP/IP
                                                                                     Administration



                                                                                                       40




                                                                                                                                                                                                       20
4/27/2011




         Growth at the Edge of the Network

                                 4,000

                                 3,500
                                                                    • Mobile
                                                                    • Device to Device
                                 3,000
          Petabytes/Day Global

                                                                    • Sensors
                                                                    • Entertainment
                                 2,500                              • Smart Home
                                                                    • Distributed Industrial
                                 2,000                              • Autos/Trucks
                                                                    • Smart Toys
                                 1,500
                                                                                    Converged
                                 1,000                                               Content

                                  500                                                           Traditional
                                                                                               Computation
                                    0
                                     2003   2004   2005   2006   2007   2008    2009    2010      2011    2012

                                                                 Year

    41                                                                                                     Copyright, 2008 © HBMG, Inc.




            Cloud Computing - a Disruptive New
            Paradigm
     “Clouds will transform the information technology (IT) industry…
     profoundly change the way people work and companies operate.”
 A “cloud” is an IT service delivered to users that provides:
  • Simple user interface that automatically provisions IT resources
        p                                    yp
  • Capacity on demand with massive scalability
                                                                                                               2015
  • New application service delivery models
  • Platform for next generation data centers                                                            Cloud Computing
  • Development in the cloud, for the cloud


                                                                  Software as a Service


  1990                                   Utility Computing


Grid Computing




                                                                                                                                                21
4/27/2011




     A Riskier World?


                             Risk Management – A changing framework


 Value of Tangible assets                                                    Knowledge
                                                                             Reputation
                                                                             Management
                                                                             Image


Value of Intangible assets                                                   Traditional
                                                                             Asset 
                                                                             Protection
1970’s                                                                                   2000+


                                                                      Knowledge based 
                                                                      economy




     12 Components of an Effective
     Information Security Program
    –      Risk Management
    –      Policy Management
    –      Organizing Information Security
              g      g                   y
    –      Asset Protection
    –      Human Resource Security
    –      Physical and Environmental Security
    –      Communication and Operations Management
    –      Access Control
    –      Information Systems Acquisition, Development and
           Maintenance
    –      Incident Management
    –      Disaster Recovery Management
    –      Compliance


                                                                                             44




                                                                                                        22
4/27/2011




Hierarchy of Needs




                     Copyright, 2008 © HBMG, Inc.




                                                          23
4/27/2011




         Social Media




                             Copyright, 2008 © HBMG, Inc.




Collaboration Technologies




                             Copyright, 2008 © HBMG, Inc.




                                                                  24
4/27/2011




                                           Evolving—Self Forming
                                          A.I.          Deep Search              Intelligent       Intelligent                      Virtual
                                                                                   Agents         Marketplaces       Group     Worlds
                                                  Weak              Inference                                     Intelligence
                                                 Signals             Engines             Knowledge
                                                                                                           Reed’s - Enterprise
                             mational
                                                                                          Networks
                                          XML           Semantic Web                                    Self Formation Minds
                                                           Knowledge                                      Metaweb
                                                                                                Massive
Speed of Connectivity — Inform



                                                                                               Multiplayer    Digital W ld
                                                                                                              Di it l World
                                          Ontologies                           Knowledge                                      Group
                                                                                                Games                         Minds
                                                              Knowledge       Management                     Life Logs
                                                                Bases
                                                                                           Life                 Market      Emergent
                                          Taxonomics                                      Casting               Places       Groups

                                                                         Enterprise                                 Wikis
                                                 Search Engines            Portals                Mobile
                                                                                               Technologies                           WeBlogs
                                           Content Portals        Websites
                                                                                                       SOCIAL MEDIA
                                                                                                                               Social
    d




                                                             WEB           Groupware
                                                                           G                    Auctions
                                                                                                A ti           People
                                                                                                               P   l
                                                           Information                                                        Networks
                                                                                          Email
                                                                                PIMs                       Computer             Community
                                           Databases                                                      Conferencing           Portals
                                                           Conference
                                                               Calls                           P2P File
                                                                     Phone Calls               Sharing
                                                  File Servers                                                           IM

                                                                         Speed of Connectivity — Social                    Copyright, 2008 © HBMG, Inc.




                                             Along for the Ride⎯Security Element
                                             Is in the Infrastructure
                                        The current and future working
                                        environment is one without perimeters
                                        or boundaries, so collaboration tools
                                        are a necessity. In the future                                              Data
                                        collaborative environment, users will
                                                                    ,
                                        no llonger have the “living in the
                                                    h    th “li i    i th
                                        inbox” mentality, and will rely less on
                                                                                                                Application
                                        standard tools like e-mail and more on
                                        other collaborative tools and                                               Host
                                        technology as a part of daily
                                        operations.                                                          Internal Network
                                        The security element for such tools
                                        will be managed at the infrastructure
                                        level, using existing and new
                                                                                                                Perimeter
                                        enterprise and network tools.
                                        The demand for security⎯managing                                     Physical Security
                                        identities,
                                        identities data protection secure
                                                         protection,
                                        networks, and transactions and                                Policies, Procedures, &
                                        resiliency⎯will be handled by the                                   Awareness
                                        infrastructure itself.




                                                                                                                                                                25
4/27/2011




            Disruptors can be:

                Technology
                Regulatory
                Economic
                Civil
                Natural Disasters
                …




      Risk
“Risk is inherent in life. As it is the antithesis of security, we 
naturally strive to eliminate risk. As worthy as that goal is, 
however, we learn with each experience that complete security is 
however, we learn with each experience that complete security is
never possible. Even if it were possible to eliminate all risk, the 
cost of achieving that total risk avoidance would have to be 
compared against the cost of the possible losses resulting from 
having accepted rather than having eliminated risk. The results of 
such an analysis could include pragmatic decisions as to whether 
achieving risk avoidance at such cost was reasonable. Applying 
reason in choosing how much risk we can accept and, hence, how 
much security we can afford is risk management. “
Julie H. Ryan
Booz‐Allen & Hamilton




                                                                             26
4/27/2011




Risk Model
Example   ‘PEST’ model




   Technical                 Economic



   IT/Systems Breakdown         Industrial Accidents                                                 
       Contamination             Government Crisis
                                 Government Crisis
     Industrial Accident          Utilities failure




 On‐site product tampering             Sabotage
       Malicious acts                 Terrorism
   Organisational failure           Labour strikes
                             Off‐site product tampering
                             Off site product tampering




             People                      Social




                                                                                                              27
4/27/2011




 Elements of the Web of Trust
All solutions to Identity Management must provide a solution for each of
these seven elements.




  Risk Management And Needed
  Security
                High
                       mpact




                                                                             Unacceptable Risk
     Business defines im
                               Impact to business




                                                                               Risk management
                                                                               drives risk to an
                                                                               acceptable level



                                                    Acceptable Risk

                                                                Probability of exploit
           Low                                                                                     High
                                                     Security engineering defines probability




                                                                                                                28
4/27/2011




     Risk Formula




      Threat Modeling & Risk Forecasting
Threat agent: Any person or thing that can do harm 
Threat: Anything that could harm an asset 
                                                                                       Risk is a statement of
Vulnerability: A deficiency that leaves an asset open to harm                          probability. It is the probability
Asset: Anything with value—what we want to protect                                     that a given threat will exploit a
Exposure: Harm caused when a threat becomes real 
E                                                                                      given vulnerability and cause
Countermeasure: Any protective measure we take to                                      harm.
safeguard an asset. This is measured by reducing the probability of 
successful exploitation                                                                            External    External               External
                                                                                                  Customers   Competitors            Non-related
                                                                                                                                     Businesses


                                                                                                                                                   Business Partners
                                                                                   Internal Operations
                                                                                                                                                         B2B
                                                                                  (i.e. Insider Threats)
                                             Giv
                             cts                   es                                                                                              Business Partners
                                                      R
                      A   ffe                             ise
                                                                To
                                                                                                                                                       Suppliers
                                                                   :                   Internal
                                                                                     Operations
                                                                                   (i.e. Financial)                                                     Global
                                                                                                                  Threat                             Governments,
                                                                                                                                                         etc.
                                                                                                                 Sources
       Mitigated By




                                   Of
                                        fs e
                                                                       Exploits




                                                                                      Internal
                                            ts                                      Technology
                                                                                                                                                   External
                                                                                                                                               Technology-driven
                                                                                      Internal
                                                                                                                                                   (threats)
                                                                                     Processes


                                                                                                                 External Physical
                                                                                                                 (BC-type threats)




                                                                                                                                                             58




                                                                                                                                                                             29
4/27/2011




In Parting: Be Paranoid

 “Sooner or later, something
fundamental in your business
     world will change.”

        ⎯ Andrew S. Grove, Founder, Intel
             “Only the Paranoid Survive”




           Copyright @2008 HBMG Inc.




In Parting: Be Paranoid

 “Sooner or later, something
fundamental in your business
     world will change.”

        ⎯ Andrew S. Grove, Founder, Intel
             “Only the Paranoid Survive”




           Copyright @2008 HBMG Inc.




                                                  30

Weitere ähnliche Inhalte

Was ist angesagt?

Latest news phoenix
Latest news phoenixLatest news phoenix
Latest news phoenixJeff Pearce
 
Panorama des offres cloud IBM
Panorama des offres cloud IBMPanorama des offres cloud IBM
Panorama des offres cloud IBMClaude Riousset
 
Does Agile address the 25 point Federal IT Reformation plan?
Does Agile address the 25 point Federal IT Reformation plan?Does Agile address the 25 point Federal IT Reformation plan?
Does Agile address the 25 point Federal IT Reformation plan?Devin Hedge
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Grenville Lannon
 
Web Conferencing for SMBs
Web Conferencing for SMBs Web Conferencing for SMBs
Web Conferencing for SMBs ReadyTalk
 
Benno Zollner - Reshaping IT
Benno Zollner - Reshaping ITBenno Zollner - Reshaping IT
Benno Zollner - Reshaping ITFujitsu France
 
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canadaMISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canadaMISA Ontario Cloud SIG
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...Compuware APM
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtRoopa Nadkarni
 
James B Murry Resume Presentation Feb2009
James B Murry Resume Presentation   Feb2009James B Murry Resume Presentation   Feb2009
James B Murry Resume Presentation Feb2009jamesbmurry
 

Was ist angesagt? (15)

Latest news phoenix
Latest news phoenixLatest news phoenix
Latest news phoenix
 
Panorama des offres cloud IBM
Panorama des offres cloud IBMPanorama des offres cloud IBM
Panorama des offres cloud IBM
 
Does Agile address the 25 point Federal IT Reformation plan?
Does Agile address the 25 point Federal IT Reformation plan?Does Agile address the 25 point Federal IT Reformation plan?
Does Agile address the 25 point Federal IT Reformation plan?
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Dispelling the vapor around cloud computing
Dispelling the vapor around cloud computingDispelling the vapor around cloud computing
Dispelling the vapor around cloud computing
 
IBM Solutions for Egovernment
IBM Solutions for Egovernment IBM Solutions for Egovernment
IBM Solutions for Egovernment
 
Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2
 
Eastern National Bank client reference
Eastern National Bank client referenceEastern National Bank client reference
Eastern National Bank client reference
 
Web Conferencing for SMBs
Web Conferencing for SMBs Web Conferencing for SMBs
Web Conferencing for SMBs
 
Benno Zollner - Reshaping IT
Benno Zollner - Reshaping ITBenno Zollner - Reshaping IT
Benno Zollner - Reshaping IT
 
THE 5 CHALLENGES
THE 5 CHALLENGESTHE 5 CHALLENGES
THE 5 CHALLENGES
 
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canadaMISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
James B Murry Resume Presentation Feb2009
James B Murry Resume Presentation   Feb2009James B Murry Resume Presentation   Feb2009
James B Murry Resume Presentation Feb2009
 

Ähnlich wie The Future of Security

The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionCorey O'Neal
 
Warsaw Seminar Diem Ho 2
Warsaw Seminar Diem Ho 2Warsaw Seminar Diem Ho 2
Warsaw Seminar Diem Ho 2Youth Agora
 
T1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh finalT1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh finalEMC Forum India
 
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...Cisco Russia
 
Big data and big content
Big data and big contentBig data and big content
Big data and big contentJohn Mancini
 
Big Data Is Here - Now What?
Big Data Is Here - Now What?Big Data Is Here - Now What?
Big Data Is Here - Now What?Chris Selland
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudVincent Kwon
 
On Future Research Areas for ICT-enabled Governance
On Future Research Areas for ICT-enabled GovernanceOn Future Research Areas for ICT-enabled Governance
On Future Research Areas for ICT-enabled GovernanceYannis Charalabidis
 
Complimentary report on the current needs of CIOs
Complimentary report on the current needs of CIOs Complimentary report on the current needs of CIOs
Complimentary report on the current needs of CIOs BMAJCHER
 
Scalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseScalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseBjorn Andersson
 
Thinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensThinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensJohn Mancini
 
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisBull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisOW2
 
Smarter Planet and Megatrends
Smarter Planet and MegatrendsSmarter Planet and Megatrends
Smarter Planet and MegatrendsIBM Danmark
 
EMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum India
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYODstefriche0199
 

Ähnlich wie The Future of Security (20)

The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing Disruption
 
Warsaw Seminar Diem Ho 2
Warsaw Seminar Diem Ho 2Warsaw Seminar Diem Ho 2
Warsaw Seminar Diem Ho 2
 
CeBIT-Preview Hamburg
CeBIT-Preview HamburgCeBIT-Preview Hamburg
CeBIT-Preview Hamburg
 
Greenplum hadoop
Greenplum hadoopGreenplum hadoop
Greenplum hadoop
 
Greenplum hadoop
Greenplum hadoopGreenplum hadoop
Greenplum hadoop
 
T1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh finalT1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh final
 
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
Cовременное предприятие. Надежные технологии для подключения, совместной рабо...
 
VISIT2008 Cloud Computing
VISIT2008 Cloud ComputingVISIT2008 Cloud Computing
VISIT2008 Cloud Computing
 
Jeffrey Nick
Jeffrey NickJeffrey Nick
Jeffrey Nick
 
Big data and big content
Big data and big contentBig data and big content
Big data and big content
 
Big Data Is Here - Now What?
Big Data Is Here - Now What?Big Data Is Here - Now What?
Big Data Is Here - Now What?
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
 
On Future Research Areas for ICT-enabled Governance
On Future Research Areas for ICT-enabled GovernanceOn Future Research Areas for ICT-enabled Governance
On Future Research Areas for ICT-enabled Governance
 
Complimentary report on the current needs of CIOs
Complimentary report on the current needs of CIOs Complimentary report on the current needs of CIOs
Complimentary report on the current needs of CIOs
 
Scalability and Availability - Without Compromise
Scalability and Availability - Without CompromiseScalability and Availability - Without Compromise
Scalability and Availability - Without Compromise
 
Thinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensThinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social Lens
 
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisBull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
 
Smarter Planet and Megatrends
Smarter Planet and MegatrendsSmarter Planet and Megatrends
Smarter Planet and Megatrends
 
EMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum Track Introductions
EMC Forum Track Introductions
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 

Mehr von InnoTech

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"InnoTech
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is MaturingInnoTech
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?InnoTech
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostInnoTech
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering StormInnoTech
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the fieldInnoTech
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged InfrastructureInnoTech
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365InnoTech
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studiesInnoTech
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential InnoTech
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?InnoTech
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...InnoTech
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeInnoTech
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacyInnoTech
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio InnoTech
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumInnoTech
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2InnoTech
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionInnoTech
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentationInnoTech
 

Mehr von InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Kürzlich hochgeladen

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Kürzlich hochgeladen (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

The Future of Security

  • 1. 4/27/2011 The Future of Security David Smith CEO  HBMGInc. dsmith@HBMGINC.com linkedin.com/in/davidsmithaustin Why is Security Hard? No system can be 100% secure – Reality is risk mitigation, not risk avoidance Difficult to prove good security – Bad security gets proven for us! Good security and no security can look the same – How does one know how secure they are? Many things to secure – People, equipment, OS, network, Application Servers, applications, phones, and databases 1
  • 2. 4/27/2011 Balancing the Business Usability x Security Performance 2
  • 3. 4/27/2011 Challenges in the 21st century Information Safety & Explosion Knowledge Security Economy Accelerating Globalization Change International Partnerships Complex Technologies Finite Diverse Resources Workforce Sustainable Life-Long Development Learning Citizen Engagement Copyright, 2008 © HBMG, Inc. 3
  • 4. 4/27/2011 The Growth Of Complexity Higher Technical Complexity DOD weapon Embedded system automotive Telecom switch National Air application Commercial Traffic Control compiler System Lower Higher Management Management Complexity Large-scale simulation Complexity Small scientific Enterprise simulation Enterprise information application systems DOD management information system Business spreadsheet Lower Technical Complexity HBMG Inc. Copyright 2009 Mega Trends to Consider… • Digitization of all content (listening = getting!) • Distribution is the default (just having a network won’t be enough) • Virtualization (location matters less and less) • Niche-ization of content & lifestyles • Mass-Personalization of media will become standard • Democratization of creation, & peer production • Amateurization of the entire value chain (but NOT to the detriment of experts) • “Godzilla-zation” of users/consumers Copyright, 2008 © HBMG, Inc. 4
  • 5. 4/27/2011 Major Trends for Software Process • System of systems is becoming more complex • Increasing software criticality and need for dependability • Increasing emphasis on end users – both inside and outside the enterprise • Decreasing value of IT • Geography doesn’t matter • The fabric of software and computing is evolving • Continuous integration - continuous delivery – group mind • Increasing software autonomy • Combination of biology and computing Copyright, 2009 © HBMG, Inc. The Limits of Technology Fundamental The laws of physics The laws of software The challenge of algorithms The difficulty of distribution The problems of design The importance of organization The impact of economics The influence of politics The limits of human imagination HBMG Inc. Copyright Human 2009 5
  • 6. 4/27/2011 Vertical Convergence with an Industry Technology: Telecom: Network: Content: Entertainment: • Computers & • Communication • Networking / IP • Media & New • Broadcasting Peripherals p Equipment q p Networking g • Media • Film • Semi- • Service • Service conductors Providers: Providers: • Advertising • Music • Internet apps Telephone/ Internet Service • Printing, • Gaming Voice & Data Providers Publishing and • Software • Sports Newspapers Mobile Wireless/ Broadband • Internet Voice & Data devices Satellite Broadcast Cable Copyright, 2008 © HBMG, Inc. Horizontally Across Different Industry Sectors: Technology: Telecom: Network: Content: Entertainment Computers & Communication Networking/ Media & Broadcasting Design Equipment IP Networking New Media Film Peripherals Semiconductors Service Service Content Advertising Music Providers: Providers: Telephone/ Printing, Publishing Manufacturing Internet apps ISP(s) & Newspapers Gaming Voice & Data Software Mobile Wireless/ Infrastructure Broadband Sports Voice & Data Services Internet devices Satellite Broadcast Cable Software Devices Distribution Copyright, 2008 © HBMG, Inc. 6
  • 7. 4/27/2011 Convergence reduces costs and risks Security Information & Systems Events Comprehensive Security & Compliance Identity & Access Privileges 7
  • 8. 4/27/2011 Change, Uncertainty, and Complexity Economic & Financial Virtual Worlds Technology Acceleration Cyber Warfare Russia - China Intangible K-12 Science Capital & Math Crisis Pandemic Terrorism Global Talent Explosion Offshore Competition p English as 2nd 3 Billion New Demographics Capitalists Economic Unions Flat Wages Regional Economic End of Moore’s Law Dislocation New Economic Superpowers in 2050? 8
  • 9. 4/27/2011 Innovation is Accelerating The “Fat Pipe” 9
  • 10. 4/27/2011 Growth of Broadband Users 4,000 3,500 3,000 Millions of Users 2,500 Cellular Subscribers 2,000 World Broadband 20 1,500 Broadband Users 1,000 Internet 500 Users 005 0 1990 1995 2000 2005 2010 2015 2020 Historical Data Source: ITU Year Source: Technology Futures, Inc. Copyright, 2008 © HBMG, Inc. Regional Forecasts—Broadband 500 100% Millions of Broadband Subscribers Broadband 450 Broadband 90% useholds 400 80% Korea 350 AP 70% Europe Percentage of Hou 300 60% NA Europe SA 250 50% World Broadband 2005 World Broadband 2006 Korea 200 40% AP NA 150 30% 100 20% SA MA MA 50 10% 0 0% 1995 2000 2005 2010 2015 2020 2025 1995 2000 2005 2010 2015 2020 2025 Historical Data Source: ITU Year Source: Technology Futures, Inc. Historical Data Source: ITU Year Source: Technology Futures, Inc. The first looking at millions of broadband subscribers, and the second looking at the penetration. 10
  • 11. 4/27/2011 Fixed Mobile Convergence The latest buzzword in the collaborative industry is fixed mobile convergence (FMC) the bil (FMC), th integration of wire line and wireless technologies to provide users with a seamless communication environment. 11
  • 12. 4/27/2011 Wireless Broadband Changes Everything…. Habits and behaviors sometimes change quickly: Once you had a great (and affordable) experience with new technology, you usually don’t want to miss it anymore. See: Blackberry iPod Skype in flight Wi Fi HD radio Blackberry, iPod, Skype, in-flight Wi-Fi, radio… Wireless enables two-way, personalized media (as opposed to mass media) Mobile content access will dwarf desktop-based access 10:1 In wireless broadband, interaction takes on a whole new meaning: – “Sharing” will become a default standard – Multimedia communications will abound (messages, video, photo, sound) – Games become all-pervasive (posing other problems) – Shared content creation is now “on the fly” (contributing, remixing, mashing, etc.) – Location-based CONTENT services will explode Receivers become senders too Copyright, 2008 © HBMG, Inc. “Mobile phones are more than a billion smart computers we can’t ignore that may create a software spiral like that of PC over the next 10 years.” —Paul Otellini, CEO, Intel “We really believe we are on the cusp of a whole new era of mobile computing ” computing. —Steve Ballmer, CEO, Microsoft Copyright, 2008 © HBMG, Inc. 12
  • 13. 4/27/2011 Top Ten Attacks • Trusted Website attacks • Effectiveness in Botnets • Data Loss – Phishing • Mobile phone threats (iphones) • Insider attacks • Identity Theft • Malicious Spyware • Web Application Security Exploits • VoIP event Phishing • Supply Chain Attacks Pillars of Information Protection Pillars of Information Protection Secure Systems S In Network Security N Physical Security P nformation Managemen nt 13
  • 14. 4/27/2011 Threats and Vulnerabilities – What’s at Stake • Critical Infrastructures • Key Resources • New Resources – The Case for Action • Cyber Threats • Insider Threats • External Threats • Cyber Terrorism • Physical Attacks Security Incident Trend, 1995–2003 (CERT/CC) 27 What kind of threats are there? External threats Internal threats – Malware – User response to unsolicited – Rootkits email or instant messages – Adware – May have a network that is – Spam difficult to maintain – Phishing – “The Enemy Within” – The code for malware isn’t – “Ransomware” p particularly difficult to find y and launch. 14
  • 15. 4/27/2011 Threat numbers - Malware 5500 new malicious software threats per month Attack Trends Data Breaches Information on data breaches that could lead to identity theft. The Education sector accounted for the majority of data breaches with 30%, followed by Government (26%) and Healthcare (15%) - almost half of breaches (46%) were due to theft or loss with hacking only accounting for 16%. 16% Hacking resulted in 73% of identities being exposed 30 15
  • 16. 4/27/2011 IT Trends Ubiquitous Cloud Virtualization Grid Internet Appliances WEB Client Server Network Punch Mainframe/ Card Midrange 1960 1970 1980 1990 2000 2010 2020 HBMG Inc. Copyright 2009 Top 10 Programming Languages 16
  • 17. 4/27/2011 Programming Trends Source: Tiobe Software Aug. 2010 Programming Community Index for August 2010 17
  • 18. 4/27/2011 Entry points - email - social engineering Security patch Famous person photo p p Anti-virus program Mp3,video Computer game “Cracked” software Serial numbers file Electronic postcard Satellite Radio Wireless TV Receivers Wireless Cameras Monitors PDAs Digital Cameras Digital Video Adapters Digital Music Adapters Smart Phones Game Consoles Desktop PCs Smart Displays Networked Storage Centers Laptop PCs Networked DVD Player Wireless Gaming Mobile Gaming Adapters Devices “Fourth Generation” Movies-on-Demand Set-top Boxes Receivers 802.11 Speakers Digital Media Receivers Personal Video MP3 Players Recorders Copyright, 2008 © HBMG, Inc. 18
  • 19. 4/27/2011 Ubiquitous Computing Mobile Peer-to-Peer Internet/Network Computing Client/Server Computing Complexity Mainframe/ Midrange Computing Punch Card Computing 1960 1970 1980 1990 2000 2010 2020 2025 Department Intra- Extra- Personal Anytime- Process Centered Enterprises Enterprises Anywhere Copyright, 2008 © HBMG, Inc. INFOSEC Research Council's “Hard Problems” list 1. Global-Scale Identity – Identification required to produce an infrastructure capable of and reliable for commercial and national security purposes 2. Insider Threat – All security technologies and approaches rely practically on modeled behavior of external bad actors. This runs contrary to a majority of the security data, which shows damaged caused by insiders to be orders of magnitude more frequent and costly 3. Availability of Time-Critical Systems – Implementing effective security for systems where timeliness, performance and availability are higher priority services than security (i.e. control systems) 4. Scalable Secure Systems – The development of large-scale secure systems where individual components or dependencies may be flawed or compromised 5. Situational Understanding and Attack Attribution – Determining the current state of security for large scale and complex systems and being able to conduct assessments and provide attribution for security incidents 6. Information Provenance – Developing systems and methods to determine and manage the integrity of information and information systems 7. Security with Privacy – Designing methods and processes to improve security while preserving or enhancing privacy through granularity of activities and systems improvements 8. Enterprise-Level Security Metrics –Scalable methods to determine or represent security or risk are needed in order to optimize resource allocation and decision making. 19
  • 20. 4/27/2011 Security is a System SECURITY Product Configuration Implementation Policy and Process SOA Reference Architecture Browsers Voice User Interface Policy, Process, Monitoring, Reporting, Usage Tracking Users Channel PC PDA Cell Phone IPhone IVR Se Portals / Websites User ecurity, Operations, & Gov Access Points Web Applications ASP JSP HTML CSS Voice/XML Interactions Orchestrated Web Services Business Process Service Service Discovery Management Service Transformations Messaging “Enterprise Service Mediation, Routing, Logging, Auditing Management Service Bus” Bus” Identity Policy Enforcement “Service Registry” Registry” Authentication Single Sign-On Web Atomic Composite Federated Business vernance , Services Data Access Logic/Rules System Platform Mainframe UNIX Windows .NET Java J2EE COBOL CICS Administration Network Network Firewalls Routers XML Accelerators Proxy Servers TCP/IP Administration 40 20
  • 21. 4/27/2011 Growth at the Edge of the Network 4,000 3,500 • Mobile • Device to Device 3,000 Petabytes/Day Global • Sensors • Entertainment 2,500 • Smart Home • Distributed Industrial 2,000 • Autos/Trucks • Smart Toys 1,500 Converged 1,000 Content 500 Traditional Computation 0 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 Year 41 Copyright, 2008 © HBMG, Inc. Cloud Computing - a Disruptive New Paradigm “Clouds will transform the information technology (IT) industry… profoundly change the way people work and companies operate.” A “cloud” is an IT service delivered to users that provides: • Simple user interface that automatically provisions IT resources p yp • Capacity on demand with massive scalability 2015 • New application service delivery models • Platform for next generation data centers Cloud Computing • Development in the cloud, for the cloud Software as a Service 1990 Utility Computing Grid Computing 21
  • 22. 4/27/2011 A Riskier World? Risk Management – A changing framework Value of Tangible assets Knowledge Reputation Management Image Value of Intangible assets Traditional Asset  Protection 1970’s 2000+ Knowledge based  economy 12 Components of an Effective Information Security Program – Risk Management – Policy Management – Organizing Information Security g g y – Asset Protection – Human Resource Security – Physical and Environmental Security – Communication and Operations Management – Access Control – Information Systems Acquisition, Development and Maintenance – Incident Management – Disaster Recovery Management – Compliance 44 22
  • 23. 4/27/2011 Hierarchy of Needs Copyright, 2008 © HBMG, Inc. 23
  • 24. 4/27/2011 Social Media Copyright, 2008 © HBMG, Inc. Collaboration Technologies Copyright, 2008 © HBMG, Inc. 24
  • 25. 4/27/2011 Evolving—Self Forming A.I. Deep Search Intelligent Intelligent Virtual Agents Marketplaces Group Worlds Weak Inference Intelligence Signals Engines Knowledge Reed’s - Enterprise mational Networks XML Semantic Web Self Formation Minds Knowledge Metaweb Massive Speed of Connectivity — Inform Multiplayer Digital W ld Di it l World Ontologies Knowledge Group Games Minds Knowledge Management Life Logs Bases Life Market Emergent Taxonomics Casting Places Groups Enterprise Wikis Search Engines Portals Mobile Technologies WeBlogs Content Portals Websites SOCIAL MEDIA Social d WEB Groupware G Auctions A ti People P l Information Networks Email PIMs Computer Community Databases Conferencing Portals Conference Calls P2P File Phone Calls Sharing File Servers IM Speed of Connectivity — Social Copyright, 2008 © HBMG, Inc. Along for the Ride⎯Security Element Is in the Infrastructure The current and future working environment is one without perimeters or boundaries, so collaboration tools are a necessity. In the future Data collaborative environment, users will , no llonger have the “living in the h th “li i i th inbox” mentality, and will rely less on Application standard tools like e-mail and more on other collaborative tools and Host technology as a part of daily operations. Internal Network The security element for such tools will be managed at the infrastructure level, using existing and new Perimeter enterprise and network tools. The demand for security⎯managing Physical Security identities, identities data protection secure protection, networks, and transactions and Policies, Procedures, & resiliency⎯will be handled by the Awareness infrastructure itself. 25
  • 26. 4/27/2011 Disruptors can be: Technology Regulatory Economic Civil Natural Disasters … Risk “Risk is inherent in life. As it is the antithesis of security, we  naturally strive to eliminate risk. As worthy as that goal is,  however, we learn with each experience that complete security is  however, we learn with each experience that complete security is never possible. Even if it were possible to eliminate all risk, the  cost of achieving that total risk avoidance would have to be  compared against the cost of the possible losses resulting from  having accepted rather than having eliminated risk. The results of  such an analysis could include pragmatic decisions as to whether  achieving risk avoidance at such cost was reasonable. Applying  reason in choosing how much risk we can accept and, hence, how  much security we can afford is risk management. “ Julie H. Ryan Booz‐Allen & Hamilton 26
  • 27. 4/27/2011 Risk Model Example ‘PEST’ model Technical Economic IT/Systems Breakdown Industrial Accidents                                                  Contamination Government Crisis Government Crisis Industrial Accident Utilities failure On‐site product tampering Sabotage Malicious acts Terrorism Organisational failure Labour strikes Off‐site product tampering Off site product tampering People Social 27
  • 28. 4/27/2011 Elements of the Web of Trust All solutions to Identity Management must provide a solution for each of these seven elements. Risk Management And Needed Security High mpact Unacceptable Risk Business defines im Impact to business Risk management drives risk to an acceptable level Acceptable Risk Probability of exploit Low High Security engineering defines probability 28
  • 29. 4/27/2011 Risk Formula Threat Modeling & Risk Forecasting Threat agent: Any person or thing that can do harm  Threat: Anything that could harm an asset  Risk is a statement of Vulnerability: A deficiency that leaves an asset open to harm  probability. It is the probability Asset: Anything with value—what we want to protect  that a given threat will exploit a Exposure: Harm caused when a threat becomes real  E given vulnerability and cause Countermeasure: Any protective measure we take to  harm. safeguard an asset. This is measured by reducing the probability of  successful exploitation External External External Customers Competitors Non-related Businesses Business Partners Internal Operations B2B (i.e. Insider Threats) Giv cts es Business Partners R A ffe ise To Suppliers : Internal Operations (i.e. Financial) Global Threat Governments, etc. Sources Mitigated By Of fs e Exploits Internal ts Technology External Technology-driven Internal (threats) Processes External Physical (BC-type threats) 58 29
  • 30. 4/27/2011 In Parting: Be Paranoid “Sooner or later, something fundamental in your business world will change.” ⎯ Andrew S. Grove, Founder, Intel “Only the Paranoid Survive” Copyright @2008 HBMG Inc. In Parting: Be Paranoid “Sooner or later, something fundamental in your business world will change.” ⎯ Andrew S. Grove, Founder, Intel “Only the Paranoid Survive” Copyright @2008 HBMG Inc. 30