1 / 9

The Threatscape is evolving rapidly

The Threatscape is evolving rapidly. Prove capabilities? Exact revenge? Erode our confidence? Perpetrate fraud in the background via the contact center? All of the above?. “Industrialization of Hacking”. Innovation drives efficiency and productivity

damia
Télécharger la présentation

The Threatscape is evolving rapidly

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Threatscape is evolving rapidly Prove capabilities? Exact revenge? Erode our confidence? Perpetrate fraud in the background via the contact center? All of the above?

  2. “Industrialization of Hacking” Innovation drives efficiency and productivity  Hacking, once a hobby, is now highly mechanized and process driven Transportation opens new markets and shrinks the world  Hackers now access potentially anything…from anywhere Communication connects far-flung parties  Personal information is shared through web applications and social media Confidential 2

  3. The vulnerable surface area continues to increase Network Boundaries Application Access Ubiquity Connectivity WiFi 4G LTE NFC Blue Tooth

  4. Speaking of connectivity… • Approaching 10 billion Internet-connected devices (IMS Research) • Forecasting 28 billion Internet-connected devices by end of 2020 • Mobile Internet devices outnumber humans this year (Cisco) • Transition from IPv4 (4.3 billion unique addresses) to IPv6 (340 trillion trilliontrillion unique addresses) • Hacking moves beyond traditional computers • Printers • Video conferencing systems • Mobile devices

  5. The hacking community has changed complexion Hobbyists/Techies Small-Time Criminals Gangs/Organized Crime Training courtesy of YouTube! Hacktivists State-Sponsored Entities Confidential 5

  6. What’s the most serious threat? Confidential 6

  7. Infiltration • APTs • Malware • Insider Threats • SQL Injection • Cross-Site Scripting • Remote Code Execution • (Spear) Phishing • Drive-By Downloads • Watering Holes Confidential 7

  8. Diversion and disruption BotNets • Media Floods • Email • Phone • SMS Confidential 8

  9. What do we do? Basic blocking and tackling • Default credentials • Default settings (e.g., on databases) • Basic web app vulnerabilities • Vulnerability patching • Security awareness training Let’s dig a bit deeper in the panel discussion… Confidential 9

More Related