Findings from XF 2012 Annual Trend and Risk Report Covers latest security threats that have occurred so far this year as well as trends that we track over time in our different research groups Provides information in the areas of safe security practices when it comes to operating network infrastructures and in writing secure software And we cover what we think are new and emerging technologies that press into the current enterprise infrastructure that demands attention either due to adoption rates – or sheer overloads as is the case we are seeing with the adoption of mobile technology The report helps the reader better understand areas of risk, and provides education for areas of focus and improvement
Here are the 4 things that I want you to take away from this session After you walk out of this room, I hope you will be excited enough to ask every single customer of your’s just one question – “what’s your security strategy?”
Number of cyber-attacks witnessed on average per day in 2012
Data and analysis based on IBM Cyber Security Intelligence & Response Team customer monitoring and consulting data from the year 2012. IBM Managed Security Services (MSS) monitors tens of billions of events per day for more than 3,700 clients in more than 130 countries, 24 hours a day, and 365 days a year. This data and analysis excludes inadvertent data disclosures by non-malicious insiders, routine malware detected or spam.
Number of cyber-attacks witnessed on average per day in 2012
Number of cyber-attacks witnessed on average per day in 2012
Let ’s talk about some major trends and challenges that are shaping our clients’ challenges and our strategy.
This chart is from the 2011 report – which we called the Year of the Targeted Attack Highlights the activity that was covered in the press last year Color of circles represent tech means used by attackers to breach these customers The size of the circle is a very rough estimate of the possible financial impact that might have occurred based on what was reported publically This chart is meant to represent the volume of activity that is happening out there – you can see it is quite heavy considering this is a mere sampling of what was probably actually going on This attack activity is driving discussions at the board level of organizations and its asking executives in companies to determine where they are prepared for these types of events where one to occur on their networks In 2012 the attack trend continues Most recent example announced publically last week by Adobe – an APT to their network As we move forward we’ll discuss we’ll discuss some of the specific attack activity and the methods used by attackers to breach systems and networks
Open Security Foundation reported 40% increase in breach events for 2012 that cover loss, theft, and exposure of personally identifiable information
Let ’s talk about some major trends and challenges that are shaping our clients’ challenges and our strategy.
Advanced Security and Threat Research, which includes the X-Force team, is the foundation for many of the pillars in the security product portfolio. As the team tasked with staying on top of the latest threats and vulnerabilities, the information it provides is a critical aspect of providing protection to the other parts of the framework. The rest of this deck will talk to the specific capabilities of this team, as well as some specific integration points between the X-Force research and the products to which they add value.
Let ’s talk about some major trends and challenges that are shaping our clients’ challenges and our strategy.
People Then: Administration Identity management Cost control Now: Insight Identify and monitor highest risk users Know who has access to sensitive data and systems Baseline normal behavior Prioritize privileged identities Data Then: Basic Control Simple access controls and encryption Now: Laser Focus Discover and protect high-value data Understand who is accessing the data, at what time of day, from where, and in what role Baseline normal behavior Applications Then: Bolt-on Periodic scanning of Web applications Now: Built-in Harden applications with access to sensitive data Scan source and real-time Baseline normal application behavior and alert Infrastructure Then: Thicker Walls Firewalls, manual patching, and antivirus Focus on perimeter security Now: Smarter Defenses Baseline system and network behavior Analyze unknown threats using advanced heuristics Expand coverage into cloud and mobile environments
Industry unique compliance NERC CIPs (version 3 to version 4 and/or 5) California privacy + data security (and other state PUCs) Looming Federal legislation (Cybersecurity Act of 2012) Privacy, information governance and data security Classification and protection of utility and customer data, including customer usage data Increased awareness of Cyber security risks With Stuxnet and variants widely reported, and the recent Basecamp publication of control system vulnerabilities and exploits, it ’s becoming clear that cyber threats are no longer an IT-only problem Management seeks more visibility in this area (e.g., situational awareness, intelligence, forensics, etc.)
Let ’s talk about some major trends and challenges that are shaping our clients’ challenges and our strategy.
Let ’s talk about some major trends and challenges that are shaping our clients’ challenges and our strategy.
Main Point:
Let ’s talk about some major trends and challenges that are shaping our clients’ challenges and our strategy.