Global Security Report 2011

Similar documents
2015 TRUSTWAVE GLOBAL SECURITY REPORT

2012 Global Threats and Trends

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

93% of large organisations and 76% of small businesses

That Point of Sale is a PoS

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, This document is the property of Bomgar Corporation.

How to effectively respond to an information security incident

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

APPLICATION SECURITY: ONE SIZE DOESN T FIT ALL

Into the cybersecurity breach

How We're Getting Creamed

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

MANAGED SECURITY TESTING

Presented by: Mike Morris and Jim Rumph

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Protecting Your Organisation from Targeted Cyber Intrusion

Trustwave MANAGED SECURITY TESTING

Incident Response 101: You ve been hacked, now what?

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM BUSINESSES

Jort Kollerie SonicWALL

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

Security Risk Management Strategy in a Mobile and Consumerised World

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

IBM Security Strategy

I N T E L L I G E N C E A S S E S S M E N T

Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests

G-Cloud Definition of Services Security Penetration Testing

Information Security Services

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Security A to Z the most important terms

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

NATIONAL CYBER SECURITY AWARENESS MONTH

Developing Secure Software in the Age of Advanced Persistent Threats

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Speaker Info Tal Be ery

CKAHU Symposium Cyber-Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security

IT Security Risks & Trends

Comprehensive Advanced Threat Defense

CompTIA Security+ (Exam SY0-410)

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How To Protect Your Online Banking From Fraud

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Why The Security You Bought Yesterday, Won t Save You Today

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Information Security for the Rest of Us

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Cyber Security. John Leek Chief Strategist

Software that provides secure access to technology, everywhere.

Reducing Application Vulnerabilities by Security Engineering

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

Unknown threats in Sweden. Study publication August 27, 2014

Cybersecurity Awareness. Part 1

Anti-exploit tools: The next wave of enterprise security

FedRAMP Penetration Test Guidance. Version 1.0.1

A Case for Managed Security

SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM ENTERPRISES

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

AGENDA HIP Ho AA w i rivacy d The B reach Happen? I P nc AA Secu dent R rit esp y o nse Corrective Action Plan What We Learned ACRONYMS USED

Enterprise Cybersecurity: Building an Effective Defense

Secure Code Development

Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

Agenda , Palo Alto Networks. Confidential and Proprietary.

Defending Against Cyber Attacks with SessionLevel Network Security

CSUF Tech Day Security Awareness Overview Dale Coddington, Information Security Office

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Welcome to the Protecting Your Identity. Training Module

Malicious Network Traffic Analysis

SPEAR-PHISHING ATTACKS

Impact of Data Breaches

Content Security: Protect Your Network with Five Must-Haves

CYBERTRON NETWORK SOLUTIONS

Cybersecurity for the C-Level

Top 20 Critical Security Controls

Transcription:

Global Security Report 2011 Charles Henderson Director of Application Security Services Trustwave s SpiderLabs

Agenda Introduction Incident Response Investigations Malware Statistics Attack Vector Evolution Strategic Initiatives Global Conclusions Questions?

Introduction About Trustwave s Global Security Report: Issued annually Based on findings and evidence from work conducted by Trustwave s SpiderLabs in 2010 Serves as a tool to educate and assist in planning business security strategy More than 200 investigations and 2,000 penetration test results contributed to the analysis and conclusions Data gathered from Top 20 GDP countries Download the report for free: https:// www.trustwave.com/gsr

Incident Response Investigations Countries Represented

Incident Response Investigations Industries Represented

Incident Response Investigations Data at Risk

Incident Response Investigations Target Assets

Incident Response Investigations Detection Methods vs. Time

Incident Response Investigations Administration Responsibility

Incident Response Investigations Window of Data Exposure

Incident Response Investigations Origin of Attack

Incident Response Investigations Payment Card Industry Compliance

Breach Triad Infiltration, Aggregation, Exfiltration Infiltration

Breach Triad Infiltration, Aggregation, Exfiltration Aggregation

Breach Triad Infiltration, Aggregation, Exfiltration Exfiltration

Malware Statistics Data Points of Interest: Classification

Malware Statistics Data Points of Interest: Anti-Forensics Capability

Attack Vector Evolution 9 Attack Vectors Over Time 8 7 6 5 4 3 2 1 Social Networking Mobile Client-Side Wireless Application E-mail Network Physical 0 1950 1960 1970 1980 1990 2000 2010

Attack Vector Evolution 1980s: Physical

Attack Vector Evolution Physical: 2010 1. Sensitive Data Left in Plain View 2. Unlocked Accessible Computer Systems 3. Data Cabling Accessible from Public Areas

Attack Vector Evolution 1990s: Network

Attack Vector Evolution Network: 2010 1. Weak or Blank Administrator Passwords 2. Database Servers Accessible 3. ARP Cache Poisoning

Attack Vector Evolution 2000s: Email

Attack Vector Evolution Email: 2010

Attack Vector Evolution 2000s: Application

Attack Vector Evolution Application: 2010 1. SQL Injection 2. Logic Flaws 3. Authorization Bypass

Attack Vector Evolution 2000s: Wireless

Attack Vector Evolution Wireless: 2010 1. Wireless Enabled while on Wired Network 2. Wireless Clients Associate w/ Known Networks 3. Easily Guessed WPA/WPA2 Pre-Shared Key

Attack Vector Evolution 2010s: Client-Side

Attack Vector Evolution Client Side (Malware) 1. Targeted Attack 2. Drive-by Infection 3. Manual Installation

Attack Vector Evolution 2010s: Mobile

Attack Vector Evolution Mobile: 1. Mobile Phishing Attacks 2. Mobile Ransomware 3. Fake Firmware and Jailbreaks

Attack Vector Evolution 2010s: Social Networking

Attack Vector Evolution Social Networking 1. Malware Propagation 2. Personal Information Exposure 3. Data Mining

Strategic Initiatives 1. Assess, Reduce and Monitor Client-side Attack Surface 2. Embrace Social Networking, but Educate Staff 3. Develop a Mobile Security Program 4. Use Multifactor Authentication 5. Eradicate Clear-text Traffic 6. Virtually Patch Web Applications Until Fixed 7. Empower Incident Response Teams 8. Enforce Security Upon Third Party Relationships 9. Implement Network Access Control 10. Analyze All Events 11. Implement an Organization-wide Security Awareness Program

Global Conclusions In 2010, the security landscape changed: Targets shifted towards endpoints and users Individuals became easily identifiable to attackers Malicious tools became more sophisticated New attack vectors introduced as we innovate; old vectors never die In 2011, organizations that are firmly committed to security will be: Resilient to attack Reduce risk of data compromise Protect sensitive data and reputation

Questions?

Contact Us +1 312 873-7500 GSR2011@trustwave.com https://www.trustwave.com/spiderlabs Twitter: @SpiderLabs / @Trustwave