IT Security Quo Vadis?
|
|
|
- Scarlett Paul
- 10 years ago
- Views:
Transcription
1 Munich IT Security Research Group IT Security Quo Vadis? Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences [email protected]
2 Prof. Dr.-Ing. Hans-Joachim Hof University of Karlsruhe, Germany Karlsruhe Institute of Technology (KIT) CS student, PhD student SAP Markets, Palo Alto, USA Software Developer Siemens AG, Corporate Technology Research Center IT Security Munich IT Security Research Group Munich University of Applied Sciences Full Professor Leader Munich IT Security Research Group - Network Security - Software Security German Chapter of the ACM Vice Chair 2
3 Introduction Quo vadis ((ˈkwəәʊ ˈvɑːdɪs ) - Latin: from the Vulgate version of John 16:5 - Literal: Where are you going? - In a broader sense: what is going to happen next? Outline - Current Situation: o Facts and Figures o IT Security in the News - Problem Areas - Action Items 3
4 Facts and Figures Many sources on IT security incidents Focus on special aspects of IT security Surprisingly hard to compare figures (timescale, metrics, approach,...) Available sources of information: - Academia (e.g. Georgia Tech) - Governments (e.g. BSI, UK-Cert) - Security suppliers (e.g. Symantec, Kaspersky, McAfee) - Activists (e.g. Hackmageddon) - Personal communication (e.g. ACM IT Security Live) - Personal observation (e.g. B.Hive Honeypot) => SECURWARE 6 Be careful: all sources have a bias 4
5 Attack numbers New malware pieces in 2014 (million) (Symantec) (McAfee) - 80 (BSI - only Windows) McAfee: Number of new malware per quater is increasing: , , , , , ,00 0, Q Q Q Q Q Q Q Q4 5
6 Attack numbers BSI: 2014: > 1 million infections a month in Germany EU Study: 47% of users discovered malware CERT-UK : Malware biggest threat CERT-UK: Malware costs the UK economy billions every year 6
7 Attack quality McAfee: serious attacks on cryptography (esp. SSL/TLS) in last year BSI: Frequently attacks initially focus on less technologically aware target individuals within companies BSI: Germany is subject to continuous cyber attacks with the objective of obtaining information and gaining financial advantages. BSI: detected attacks by intelligence agencies on German infrastructure in business, research, and public administration 7
8 Attack quality Classification of attacks (distribution of motivation behind attacks listed on Hackmageddon) 8
9 Attack targets McAfee: Total number of malware increasing for mobile devices (especially Android) , , , , , , ,00 0, Q Q Q Q Q Q Q Q4 Kaspersky: mobile malware samples in 2014 (more than in total) 9
10 Attack targets Kaspersky: 19% of Android users encountered a mobile threat at least once during the year (e.g. March 2014: attacks) BSI: Production and process automation systems are increasingly susceptible to cyber attack BSI: Advanced Persistent Threats (APT) focus chiefly on the defense industry, high-tech sectors [...], research institutes and public administration. 10
11 Attack targets ENISA: around 90 percent of web exploits are Java related Kaspersky: Target Applications: AndroidOS Adobe Flash Mircosoft Office Adobe Reader Browsers Oracle Java 11
12 Attack targets BSI: Number of critical vulnerabilities in standard IT product remains high, for 13 products: Vulnerable Of which critical
13 Defense Symantec: average time to patch top 5 zero-days: : 4 days : 59 days Symantec: total days of exposure for top 5 zero-days: : 19 days : 295 days McAfee: most vulerable high-traffic websites were quickly patched, many low-traffic sites and IP-enabled devices remain vulnerable (Heartbleed) Heartbleed study: number of vulnerable host found in scan area: - Day 0 : Day : Day : (!!!) - 43 % of admins tried to fix vulnerability, only 14% succeeded 13
14 Defense ENISA: Over 50% of malware undetected by antivirus products ENISA: Conficker worm (6 years old) still most commonly detected malware ENISA: 70% of web sites use unsupported Java versions CERT-UK: vulnerable network services observed in the UK McAfee: Multiple Android applications fail to properly validate SSL certificates - 18 apps from Top 25 downloaded mobile apps still vulnerable months after notification (!!!) - Leak account data of third party services (social networks, cloud,...) 14
15 Defense Kaspersky: Analysis of home appliances - 14 vulnerabilities in NAS - 1 vulnerability in Smart TV - Several potentially hidden remote control functions in the router ENISA/OWASP: Reduction of web application attack surfaces SQL Injection, Clickjacking and Cross Site Request Forgery (CSRF) 15
16 Trends: ENISA 16
17 Trends: BSI 17
18 Summary Facts and Figures Huge increase in number of attacks Software quality (security) does not improve Software developers have problems in providing patches in a reasonable time or do not provide patches at all Service providers have problems proving secure services or do not care about security Cyber Crime is on the rise Attackers move quickly to new areas (at the moment: mobile devices, Smart Homes,...) Common defense means becoming useless 18
19 IT Security in the news (September 2014) 19
20 IT Security in the news (October 2014) 20
21 IT Security in the news (March 2015) 21
22 IT Security in the news (May 2015) 22
23 IT Security in the news (June 2015) 23
24 IT Security in the news (July 2015) 24
25 IT Security (?) in the news (July 2015) 25
26 IT Security in the news (July 2015) 26
27 IT Security in the news (July 2015) 27
28 IT Security in the news (August 2015) 28
29 IT Security in the news (August 2015) 29
30 Summary: IT Security in the News High-value targets hacked Everything gets hacked (Internet of Hacked Things) Non-excusable security vulnerabilities (not checking default configuration ) Components used by many products are dangerous Even many eyes (Open Source) cannot prevent vulnerabilities Establishment of trust by certificates has limitations 30
31 Problem Areas to Focus on in the Future Software and service quality Trustworthiness of software Diversity for critical software components Use of standard IT in new domains Security education Traceability of Attacks 31
32 Action Item: Software and Service Quality Have software developer given up? - Still many vulnerabilities in software - Incident handling worse than ever - It seems as if there is a don t care attitude Have service provider given up? - Many vulnerable services - Services not kept up to date concerning security - It seems as if there is a don t care attitude 32
33 Action Item: Software and Service Quality Software quality must be improved - Should target for zero vulnerabilities - Should target for attack resilient systems - Should over-engineer security: current risk-based approach may be wrong - Do not value time to market over security (no banana software ) - Secure Scrum@SECURWARE 1 Make using product in a secure way easy - Security by default: Default installation/configuration should be secure - Many unprofessional administrators: Offer auto-update, take care auto-update does not screw the system - Design usable security 33
34 Action Item: Software and Service Quality Incident management must be improved - Software Developers: target for a very short time and good quality - Admins: detect problems fast, take countermeasures fast Open Source software may be dangerous - Current attacks target open source components - Heartbleed: trivial programming error that should not have slipped professional quality management - Perhaps the many eyes see all paradigm of open source security is wrong (see Shellshock) Quo vadis? Situation will not improve much in the future External pressure necessary (software liability law, privacy law, regulation of app stores) Other domains do not accept crappy products (learn from safety) 34
35 Action Item: Trustworthiness of Software Developers and users have problems judging on the trustworthiness of software - Many third party components (and many version changes) - Hard to verify OS and hardware Governments suspected to force developers to insert backdoors/ vulnerabilities for surveillance (e.g. USA) Backdoors can also be used by attackers European hardware platform and OS is necessary First steps: IT security made in Germany (However: limited approach) Quo vadis? We will still be dependent on US software in 10 years (problem!!!) 35
36 Action Item: Diversity for Critical Software Components Too little diversity in critical (=widely used) componentes - OpenSSL - Browsers - Web-Servers - Java -... Obviously: many eyes looking on these components did not succeed in avoiding vulnerabilities Forking existing Open Source projects could not be the solution Quo vadis? There may be more alternatives, but it is very likely that they share code and that there still will be a preferred component that is ubiquitously used 36
37 Action Item: Use of Standard IT in new Domains Computer Science, standard IT, and connection to the Internet coming to new domains - Connected Car => SECURWARE 8 - Internet of Things - Industry Smart Homes - Smart TVs -... Infects domains with new security problems - Often out of expertise of developers of these domains - Observations: o Domain experts often naive in considering risks o Computer scientists often ignorant to domain specific problems 37
38 Action Item: Use of Standard IT in new Domains Those industry guys are so stupid, Industry 4.0 will be a total security failure, these people don t even have a Chief Security Officer in their company Both sides should learn from each other - Safety understand in depth in industry, many high quality processes, IT security could learn from safety engineering Quo vadis? After a period of spectacular hacks, IT security will be on a high level in new domains. IT security itself will benefit from contact with new domains 38
39 Action Item: Security Education Education of software developers helps to avoid vulnerabilities - Example: OWASP - Decline of SQL Injection and CSRF IT security courses should be mandatory in CS education Teach people respect for IT security problems: People should know when to ask a security expert Teach understanding of security problems, not recipes for security solutions Teach a system view (necessary for IT security) Teach limitations of security means - E.g. certification 39
40 Action Item: Security Education Typical Bachelor student: - Read first (maybe second sentence) of exercise - Google, click first result (maybe also second) - Do whatever is written on this page, regardless of whether it is a solution for the problem at hand or not Boundary conditions never considered Side effects never considered Computer Science education must really change! Quo vadis? Interest in IT security education will increase in the near future (job options...). Big changes in computer science education will take decades. 40
41 Action Item: Traceability of Attacks Today: hacking teams affiliated with states - E.g. Team Red, military unit (APT1) - Espionage, sabotage IT forensic is a hard problem, identities can be spoofed Knowledge of origins of an attack is necessary for responsible reaction on a state level (diplomatic, weapons,...) States thinking about non-cyber responses on cyber attacks (Tallinn Manual 2.0 to be published 2016) Traceability may be a good means to avoid cyber attacks by intelligence agencies or military cyber units Quo vadis? There will be a kind of attack radar to trace the origin of attacks in the future 41
42 Thank you for your attention Contact details: Prof. Dr.-Ing. Hans-Joachim Hof MuSe Munich IT Security Research Group Department of Computer Science and Mathematics Munich University of Applied Sciences Lothstrasse Munich Germany (register for my newsletter) 42
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme
Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme avecto.com Contents Introduction to the scheme 2 Boundary firewalls and internet gateways 3 Secure configuration
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Protecting productivity with Plant Security Services
Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
12 Security Camera System Best Practices - Cyber Safe
12 Security Camera System Best Practices - Cyber Safe Dean Drako, President and CEO, Eagle Eye Networks Website version of white paper Dean Drako video introduction for cyber security white paper Introduction
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege: Guard the Gaps with Patch Management 1.0
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 [email protected]
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 SECURITY IS A PROCESS, NOT A STATE CARVE SYSTEMS LLC [email protected] Carve s Roots (tl;dr)
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Gregg Gerber. Strategic Engagement, Emerging Markets
Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Palo Alto Networks. October 6
Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%
G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview
Description C Service Overview G- Cloud Specialist Cloud Services Security and Penetration Testing This document provides a description of TVS s Security and Penetration Testing Service offered under the
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Attribution: The Holy Grail or Waste of Time? Billy Leonard Google Should this be the end, our Holy Grail? How s that picture going to help you now? But, the pictures make me safer! We can do better. Our
Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security
Next-Generation Penetration Testing Benjamin Mossé, MD, Mossé Security About Me Managing Director of Mossé Security Creator of an Mossé Cyber Security Institute - in Melbourne +30,000 machines compromised
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
Developing Secure Software in the Age of Advanced Persistent Threats
Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer
APT Advanced Persistent Threat Time to rethink?
APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand [email protected] http://www.csis.dk Table of contents Table of contents...
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Web Security. Discovering, Analyzing and Mitigating Web Security Threats
Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations
Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate
Accelerate Patching Progress Title of in Presentation the Enterprise the Enterprise Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate Insert presenter logo here on
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Cybersecurity: An Innovative Approach to Advanced Persistent Threats
Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used
Advanced & Persistent Threat Analysis - I
Advanced & Persistent Threat Analysis - I Burak Ekici [email protected] Department of Computer Engineering, Yaşar University, Turkey. April 21, 2012 Burak Ekici (Dept. of Comp. Eng.) Advanced & Persistent
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only
Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors Microsoft Confidential for internal use only Wall Street Journal, JP Morgan, Lockheed, Bushehr nuclear
WHITE PAPER: THREAT INTELLIGENCE RANKING
WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes
EC Council Certified Ethical Hacker V8
Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they
Information Security for the Rest of Us
Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Advanced Endpoint Protection
Advanced Endpoint Protection CONTAIN IDENTIFY CONTROL Nick Keller Director Federal Civilian Sales Duncker Candle Problem Solution Creativity, Change the Paradigm Why listen to me? Connect these 3 Companies
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
White Paper - Crypto Virus. A guide to protecting your IT
White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
White Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
Accelerate Patching Progress in the Enterprise. Wolfgang Kandek CTO Qualys, Inc.
Accelerate Patching Progress in the Enterprise Wolfgang Kandek CTO Qualys, Inc. Introduction Patch Management Patch Progress Data Common Steps Case Studies Actions Summary References Q&A 2 Patch Management
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved
Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
