Top 5 Security Trends and Strategies for 2011/2012 Peter Sandkuijl Europe SE manager network security psandkuijl@checkpoint.com

Similar documents
Check Point 3D Security

Building a Business Case:

Securing the private cloud

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Managing Web Security in an Increasingly Challenging Threat Landscape

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

isheriff CLOUD SECURITY

Data Center Security in a World Without Perimeters

2012 Bit9 Cyber Security Research Report

Jort Kollerie SonicWALL

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

The Impact of Cybercrime on Business

Endpoint Security More secure. Less complex. Less costs... More control.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Data Center security trends

PC & Internet Security

Anti-exploit tools: The next wave of enterprise security

TRENDS IN THE THREAT LANDSCAPE

Fundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

FORBIDDEN - Ethical Hacking Workshop Duration

The Leading Provider of Endpoint Security Solutions

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Readiness Assessments: Vital to Secure Mobility

Why Cloud Security? FIVE WAYS CLOUD SECURITY IS BETTER AT PROTECTING AND ENABLING YOUR BUSINESS. Why Cloud Security?

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Global IT Security Risks

Cyber and Mobile Landscape, Challenges, & Best Practices

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Cisco & Big Data Security

Deploying Firewalls Throughout Your Organization

Promoting Network Security (A Service Provider Perspective)

Security Practices for Online Collaboration and Social Media

Evolution of attacks and Intrusion Detection

The Hillstone and Trend Micro Joint Solution

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Conquering PCI DSS Compliance

Network Security. Intertech Associates, Inc.

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

The Mile High Denver Chapter of ARMA welcomes you to our virtual meeting!

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Beyond the Hype: Advanced Persistent Threats

Top tips for improved network security

The Attacker s Target: The Small Business

ITAR Compliance Best Practices Guide

security changes with Orange focus on your business, we focus on your security

Roger s Cyber Security and Compliance Mini-Guide

What keep the CIO up at Night Managing Security Nightmares

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Endpoint Security: Moving Beyond AV

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cybersecurity in an All-IP World Are You Prepared?

Five Best Practices for Secure Enterprise Content Mobility

White. Paper. Understanding and Addressing APTs. September 2012

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Loophole+ with Ethical Hacking and Penetration Testing

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Solution Brief. Aerohive and OpenDNS. Advanced Network Security for Retail Stores

IBM Endpoint Manager for Core Protection

Symptoms of a Data Breach in Your Business

World Endpoint Security Products Markets

IBM Security Intrusion Prevention Solutions

How To Secure Your Store Data With Fortinet

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Cyber Security. John Leek Chief Strategist

Integrated Protection for Systems. João Batista Territory Manager

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Internet security: Shutting the doors to keep hackers off your network

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Endpoint Security Management

Cyber Security Solutions:

EnCase Cybersecurity In Action

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Taking a Comprehensive Approach to Cloud Security

What s Lurking in Your Network & The Business Impact of Data Breaches. Colby Clark Director of Incident Management FishNet Security

The Cancer Running Through IT Cybercrime and Information Security

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

The End Endorsed Devices pose a Large Security Risk to Your Organization

How to Secure Your Environment

Opportunities in Indian IT Security Market

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

AB 1149 Compliance: Data Security Best Practices

Perception and knowledge of IT threats: the consumer s point of view

The Evolution of the Enterprise And Enterprise Security

Putting Operators at the Centre of

The User is Evolving. July 12, 2011

Table of Contents. White paper. Executive Summary

10 best practice suggestions for common smartphone threats

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

Transcription:

Top 5 Security Trends and Strategies for 2011/2012 Peter Sandkuijl Europe SE manager network security psandkuijl@checkpoint.com 2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.

Top Trends of 2011/2012 1 2 3 Virtualization & Cloud Computing IT Consumerization Threat Landscape 4 5 Consolidation & Complexity Data Security and Loss 2

2011 Security Trends 1 Virtualization & Cloud Computing 3

On Data Center Consolidation Private cloud 1 28% have one 30% plan one CIOs will virtualize 55% of production servers next year, up from 42% this year 2 1 Information Week, June 2010 2 Morgan Stanley, June 2010 4

Enterprise Virtualization Initiatives Top Security Challenges for Server Virtualization What are the biggest security challenges preventing server virtualization in your enterprise? Lack of skills in security team 36% Cost of new information security solutions 28% Can t port existing security tools from physical to virtual world Lack of security best practices for server virtualization 24% Regulatory compliance issues 24% 26% Lack of knowledge in security teams remains the biggest challenge in moving to virtualized environments. Enterprise Strategy Group 2010 Survey of enterprise decision makers 5

On Cloud Computing Q: Rate the challenges/issues of the 'cloud'/on-demand model (1=not significant, 5=very significant) Security 88.5% Performance 88.1% Virtualization Security will seep Availability 84.8% out of Hard to the integrate datacenter with and in to 84.5% in-house IT Not enough ability to 83.3% customize other facets of the enterprise IDC: Worldwide Worried Security cloud Products will and Services 2011 Top 10 Predictions 81.1% cost more Bringing back in-house may be difficult Not enough major suppliers yet 74.6% 80.3% Source: Frank Gens & IDC Enterprise Panel 65% 70% 75% 80% 85% 90% % responding 3, 4 or 5 6

On Cloud Priorities Top hardware / IT infrastructure priorities Are you considering building an internal or private cloud operated by IT (not a service provider) in next 12 months? Enterprise 45% 55% Mid-market 56% 44% Small Business 64% 36% Not currently planned On project list Forrester Research 2010 Enterprise and SMB Survey 7

2011 Security Trends 2 IT Consumerization 8

Consumers Leading the Enterprise Consumer hardware used for work Consumer services used for work 9

% Penetration Mobile Workforce Growth Enterprise Mobile Device Population Market penetration over time 100 80 Mobile Population 60 40 20 Anchored Desktop 0 2000 2005 2010 451 Group 2009/2010 10

2011 Security Trends 3 Threat Landscape 11

Today s Threat Landscape Increasing Sophistication Crime and Profit-driven Cyber-warfare and Hactivists Zeus Stuxnet Aurora Botnets XSS Trojans Worms Multi-vector Polymorphic Blended and multi-variant Cyber Crimeware Financial theft Intellectual property Criminal networks Cyber-warfare Iran and Stuxnet Wikileaks Cyber Hactivists 12

TROJAN BOTNET ADWARE EXPLOIT ROOTKIT SCAREWARE On Top Threats Stuxnet widely considered the most sophisticated computer threat Most prevalent threat types created to date Stuxnet exploited four previously unknown vulnerabilities, at a time when exploiting a single one is a big deal. SOFTPEDIA.com 2011 Hackers seeking source code from Google, Adobe and others used nearly 12 pieces of malware and levels of encryption to burrow deeply into the bowels of company networks WIRED 2010 Operation Aurora Zeus Zbot Zeus detected only 23 percent of the time is the No. 1 financial Trojan representing 44 percent of all financial malware infections today. Darkreading.com 2010 13

2011 Security Trends 4 Consolidation and Complexity 16

On Complexity and Point-product Sprawl Biggest IT Security Challenges Which of the following are the biggest information/network security challenges facing your company? Managing the complexity of security 51% Enforcing security policies 35% Preventing data breaches from outside attackers 29% Preventing data theft by employees or other insiders 23% The requirement to manage security complexity grows steadily each year. InformationWeek 2010 Survey of security decision makers 17

On Complexity and Point-product Sprawl Your world: Top And network don t forget security endpoint nearly technologies doubling the and point number products of point deployed products IPS URL URL Filtering Filtering IPS Firewall VPN VPN NAC 18

2011 Security Trends 5 Data Security and Loss 20

On Data Loss 81% Percentage of companies breached who were not PCI compliant. Percentage of outbound e-mail that contains content which poses a legal, financial or regulatory risk. 20% 31% Percentage of customers who end their relationship with a company if they are affected by a breach. 21

USBs and Laptops Corporate Email Public Webmail WiFi Networks CDs/DVDs On Top Sources of Data Loss Risk channels: Top five sources of data loss across organizations and enterprises worldwide 30% 25% 20% 15% 10% 1 2 3 4 5 5% 0% InformationWeek 2010 Security Survey 22

Data Loss in the News Shell Corporation loses database of 176K employees Apple exposed over 100K highprofile ipad customer names Facebook looses user data for 170M subscribers McDonald s loses an undisclosed amount of customer data February June July December 2010 Data Loss Events 23

To Do list for IT security leaders: Meet IT governance, risk and compliance requirements Prevent the loss of sensitive data Secure and manage Web 2.0 applications Secure all fixed and mobile endpoints Protect against attacks and evolving threats Secure virtualized and cloud environments Reduce IT security spending 24

Thank You! 25