SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Pinpointing Real Attacks in the
Sea of Security
Sreejesh K M, CTO @ TBC-World Group
linkedin.com/in/sreejeshkm
sreejesh.km@tbc-world.com
Business On Internet
• Small and Big Businesses are leveraging
Private/Public/Hybrid cloud, either as IaaS, PaaS
or SaaS or a combination of these, than ever
before. Even enterprise apps embraced Internet
• Man and Machine are generating/consuming
more data than ever (1 Billion Smart Phones and
counting)
• Man: Car/Home and
Office/Mobile/Tab/Desktop/Wearable
technologies at an unprecedented scale
• Machine: Internet of Things, Devices and
Tons of sensors interacting with cloud
• Handling Sea of Data than ever before in the
History of Min-kind, i.e literally tons of Data in
Transit and in Storage
• And who don’t use Big Data?
Internet - For Secure & Fast Business?
• Diversity of Browsers, Protocols, Standards,
Devices and Network Types
– Already Chaotic Internet Space, now
Operating at Unprecedented Scale adding
to Additional Security Challenges
• Sophisticated Attacks at Cloud Scale
– DDOS Attacks
– SQLI/XSS, Client-side attacks, ZERO day
attacks
• We hear this much less now
– VM theft/VM escape and Hyper Jacking.
– Data Leakage via Multi-tenant Isolation
decisions, Via Shared Cache, Cross VM Side
Kicks
– Attacks across OSI Layers
Changing Attack Landscape
• DDOS attacks tripled since 2010
– Attacks at the rate 20Gb/s are now seen – attackers are
surely using the cloud as well, to scale!
• Rate of increase over years for Web layer attacks
is much more than Network Layer attacks
• Hacktivism, Government Malware, Black Clouds
• CVE even had to change their syntax to include
more digits to account for more than 9999 in a
year!
• Many cases of being unable to keep
Assets/Data safe from un-authorized access,
modification or destruction during storage
and/or transmission or just a Slow Trap
Be Aware – False sense of Security
– More Apps being built, faster than ever (Heard
of Nightly Builds?)!
– Beware of Third-Party
» Up to 70% of Internally Developed Code
originates outside of the development
Team
» Pattern of Attackers attacking third party
Framework level vulnerabilities
– Gap between of IT Operations and
Development team w.r.to Security Readiness
(e.g. Vulnerable components, potential
breaking config changes)
– Web Security is complex. Developers have a lot
of Catch-up to do!
– Attackers are on Steroid!
How to Succeed?
• Some are having better success
with Cloud Scale Internet than the
others
– A lot is to do with how smartly
you are handling Security risks
– A lot is to do with, whether you
are focusing on the right areas
where there is bigger risk
– A lot is to do with, do you know
those areas of risk well enough
and Budget it Right
IT Spending on Security
• Businesses are willing to spend on IT Security, but not enough
focus on some areas
– 70 to 80% of Security spending is historically on the
Network Infra level or Host level security (IDS, Firewall,
Appliances)
– More Vulnerability at App Layer: More data being
transferred, more devices accessing data, more auto-scaled
servers serving data
• Attackers are quick enough to attack the surface,
where there is more vulnerability,
– Miniscule Spending at App Layer – where most attacks are
now focused
• In most Enterprise Projects. Security do find a mention,
but it is the first causality in the rat race to lower ‘Time
to Market’ and ‘Minimum Viable Product’ scenarios.
• We end up spending least of amount of money on
most attacked surface
Define and Measure
• Define Web Security Priority Areas per projects & system landscape
• Calculate Cost of Down-time (with criticality of Operations downtime)
• Calculate Cost of Data Loss (lost customers/brand image)
• Calculate Cost of Slowness (Cart Abandonment)
• Get Executive Buy-in for prioritized areas
• Account for appropriate investment for each Risk Area separately, early in the
cycle
Few Action Steps
• When out-sourcing, Factor Risks in RFQ, and get SLA backed delivery for
defined priority Security areas
• When building Solutions, Fortify from the ground-up
– Hire right team who are Competent in Security as well (How many
Resumes and JDs today speak of Security as a skill?)
– Via WAST/Code Level/Design Level Automated Security tests
– Make independent Vulnerability Testing and Penetration testing a
practice
• Prepare Effective Counters against DDOS and Unknown attacks
– BUILD vs BUY Site Defenders: Weigh the effect of creating DDOS
paradox vs investing in Solutions like Akamai Site Defenders
– Web Application firewalling
Quick Summary
• @Planning Stage : Define Priorities and Budget it Right for Security at Cloud Scale
• @Architect: For Volume, Velocity And Variety of Data, and still be Secure and
Fault Tolerant
• @Dev : Ongoing measures to ensure that critical Security areas are not the
causality in the event of mad push for MVP/Time to market
• @Deploy: Be aware of widely Attacked ports and Attack types, Spread out to
Horizontal Edges, Deep handshake with Dev Architects
• @Operations: Constant Monitoring and health checks, Audits, and
• Be Alert and Be Ready to Adapt!
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web/Cloud security is minuscule

Weitere ähnliche Inhalte

Was ist angesagt?

Common WebApp Vulnerabilities and What to Do About Them
Common WebApp Vulnerabilities and What to Do About ThemCommon WebApp Vulnerabilities and What to Do About Them
Common WebApp Vulnerabilities and What to Do About ThemEoin Woods
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeDenim Group
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...Jane Alexander
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ EnterprisesNigel Hanson
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingSPI Conference
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0Rafal Los
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Rafal Los
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startupsKesava Reddy
 
Selling to The IT Department
Selling to The IT DepartmentSelling to The IT Department
Selling to The IT Department3VR Inc.
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016 Scott Carlson
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...centralohioissa
 

Was ist angesagt? (20)

Common WebApp Vulnerabilities and What to Do About Them
Common WebApp Vulnerabilities and What to Do About ThemCommon WebApp Vulnerabilities and What to Do About Them
Common WebApp Vulnerabilities and What to Do About Them
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startups
 
Selling to The IT Department
Selling to The IT DepartmentSelling to The IT Department
Selling to The IT Department
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
 

Andere mochten auch

Eenvoudig geld besparen met de Bespaartips Top 50
Eenvoudig geld besparen met de Bespaartips Top 50Eenvoudig geld besparen met de Bespaartips Top 50
Eenvoudig geld besparen met de Bespaartips Top 50Geldreview.nl
 
Onderzoek geld lenen in Nederland 2014
Onderzoek geld lenen in Nederland 2014Onderzoek geld lenen in Nederland 2014
Onderzoek geld lenen in Nederland 2014Geldreview.nl
 
Productivity Improvement Tips for New age Professionals
Productivity Improvement Tips for New age ProfessionalsProductivity Improvement Tips for New age Professionals
Productivity Improvement Tips for New age ProfessionalsSreejesh Madonandy
 
Promoting SSA Tucson's Spring Festival 2013
Promoting SSA Tucson's Spring Festival  2013Promoting SSA Tucson's Spring Festival  2013
Promoting SSA Tucson's Spring Festival 2013Sunrise Sunset
 
How to choose a frieght fowarding agent
How to choose a frieght fowarding agentHow to choose a frieght fowarding agent
How to choose a frieght fowarding agentcanada_3pllinks
 
Are you a fool for quizzes
Are you a fool for quizzesAre you a fool for quizzes
Are you a fool for quizzesNoel Ortega
 
Zmoviedb
ZmoviedbZmoviedb
Zmoviedbzainmdb
 

Andere mochten auch (9)

Eenvoudig geld besparen met de Bespaartips Top 50
Eenvoudig geld besparen met de Bespaartips Top 50Eenvoudig geld besparen met de Bespaartips Top 50
Eenvoudig geld besparen met de Bespaartips Top 50
 
Onderzoek geld lenen in Nederland 2014
Onderzoek geld lenen in Nederland 2014Onderzoek geld lenen in Nederland 2014
Onderzoek geld lenen in Nederland 2014
 
Productivity Improvement Tips for New age Professionals
Productivity Improvement Tips for New age ProfessionalsProductivity Improvement Tips for New age Professionals
Productivity Improvement Tips for New age Professionals
 
Promoting SSA Tucson's Spring Festival 2013
Promoting SSA Tucson's Spring Festival  2013Promoting SSA Tucson's Spring Festival  2013
Promoting SSA Tucson's Spring Festival 2013
 
Berbicara soal agama
Berbicara soal agamaBerbicara soal agama
Berbicara soal agama
 
How to choose a frieght fowarding agent
How to choose a frieght fowarding agentHow to choose a frieght fowarding agent
How to choose a frieght fowarding agent
 
Inf consultant
Inf consultantInf consultant
Inf consultant
 
Are you a fool for quizzes
Are you a fool for quizzesAre you a fool for quizzes
Are you a fool for quizzes
 
Zmoviedb
ZmoviedbZmoviedb
Zmoviedb
 

Ähnlich wie Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web/Cloud security is minuscule

An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform ServiceSoumitra Bhattacharyya
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Tudor Damian
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 

Ähnlich wie Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web/Cloud security is minuscule (20)

An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
SecurityOperations
SecurityOperationsSecurityOperations
SecurityOperations
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 

Kürzlich hochgeladen

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Kürzlich hochgeladen (20)

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 

Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web/Cloud security is minuscule

  • 1. Pinpointing Real Attacks in the Sea of Security Sreejesh K M, CTO @ TBC-World Group linkedin.com/in/sreejeshkm sreejesh.km@tbc-world.com
  • 2. Business On Internet • Small and Big Businesses are leveraging Private/Public/Hybrid cloud, either as IaaS, PaaS or SaaS or a combination of these, than ever before. Even enterprise apps embraced Internet • Man and Machine are generating/consuming more data than ever (1 Billion Smart Phones and counting) • Man: Car/Home and Office/Mobile/Tab/Desktop/Wearable technologies at an unprecedented scale • Machine: Internet of Things, Devices and Tons of sensors interacting with cloud • Handling Sea of Data than ever before in the History of Min-kind, i.e literally tons of Data in Transit and in Storage • And who don’t use Big Data?
  • 3. Internet - For Secure & Fast Business? • Diversity of Browsers, Protocols, Standards, Devices and Network Types – Already Chaotic Internet Space, now Operating at Unprecedented Scale adding to Additional Security Challenges • Sophisticated Attacks at Cloud Scale – DDOS Attacks – SQLI/XSS, Client-side attacks, ZERO day attacks • We hear this much less now – VM theft/VM escape and Hyper Jacking. – Data Leakage via Multi-tenant Isolation decisions, Via Shared Cache, Cross VM Side Kicks – Attacks across OSI Layers
  • 4. Changing Attack Landscape • DDOS attacks tripled since 2010 – Attacks at the rate 20Gb/s are now seen – attackers are surely using the cloud as well, to scale! • Rate of increase over years for Web layer attacks is much more than Network Layer attacks • Hacktivism, Government Malware, Black Clouds • CVE even had to change their syntax to include more digits to account for more than 9999 in a year! • Many cases of being unable to keep Assets/Data safe from un-authorized access, modification or destruction during storage and/or transmission or just a Slow Trap
  • 5. Be Aware – False sense of Security – More Apps being built, faster than ever (Heard of Nightly Builds?)! – Beware of Third-Party » Up to 70% of Internally Developed Code originates outside of the development Team » Pattern of Attackers attacking third party Framework level vulnerabilities – Gap between of IT Operations and Development team w.r.to Security Readiness (e.g. Vulnerable components, potential breaking config changes) – Web Security is complex. Developers have a lot of Catch-up to do! – Attackers are on Steroid!
  • 6. How to Succeed? • Some are having better success with Cloud Scale Internet than the others – A lot is to do with how smartly you are handling Security risks – A lot is to do with, whether you are focusing on the right areas where there is bigger risk – A lot is to do with, do you know those areas of risk well enough and Budget it Right
  • 7. IT Spending on Security • Businesses are willing to spend on IT Security, but not enough focus on some areas – 70 to 80% of Security spending is historically on the Network Infra level or Host level security (IDS, Firewall, Appliances) – More Vulnerability at App Layer: More data being transferred, more devices accessing data, more auto-scaled servers serving data • Attackers are quick enough to attack the surface, where there is more vulnerability, – Miniscule Spending at App Layer – where most attacks are now focused • In most Enterprise Projects. Security do find a mention, but it is the first causality in the rat race to lower ‘Time to Market’ and ‘Minimum Viable Product’ scenarios. • We end up spending least of amount of money on most attacked surface
  • 8. Define and Measure • Define Web Security Priority Areas per projects & system landscape • Calculate Cost of Down-time (with criticality of Operations downtime) • Calculate Cost of Data Loss (lost customers/brand image) • Calculate Cost of Slowness (Cart Abandonment) • Get Executive Buy-in for prioritized areas • Account for appropriate investment for each Risk Area separately, early in the cycle
  • 9. Few Action Steps • When out-sourcing, Factor Risks in RFQ, and get SLA backed delivery for defined priority Security areas • When building Solutions, Fortify from the ground-up – Hire right team who are Competent in Security as well (How many Resumes and JDs today speak of Security as a skill?) – Via WAST/Code Level/Design Level Automated Security tests – Make independent Vulnerability Testing and Penetration testing a practice • Prepare Effective Counters against DDOS and Unknown attacks – BUILD vs BUY Site Defenders: Weigh the effect of creating DDOS paradox vs investing in Solutions like Akamai Site Defenders – Web Application firewalling
  • 10. Quick Summary • @Planning Stage : Define Priorities and Budget it Right for Security at Cloud Scale • @Architect: For Volume, Velocity And Variety of Data, and still be Secure and Fault Tolerant • @Dev : Ongoing measures to ensure that critical Security areas are not the causality in the event of mad push for MVP/Time to market • @Deploy: Be aware of widely Attacked ports and Attack types, Spread out to Horizontal Edges, Deep handshake with Dev Architects • @Operations: Constant Monitoring and health checks, Audits, and • Be Alert and Be Ready to Adapt!