280 likes | 399 Vues
The ISF Threat Horizon Report 2010 provides a critical examination of emerging threats to information security over the next 24 months. Written for both information security professionals and business leaders, the report identifies key risk factors, including cyber-terrorism and organized crime, and emphasizes the importance of modernizing security strategies in response to evolving threats. With insights into technological advancements and socio-economic trends, the ISF guides organizations on reassessing their risk profiles and adapting their security plans to succeed in a rapidly changing environment.
E N D
The Threat Horizon 2010 Jason CreaseyHead of Research
The Information Security Forum (ISF) • An international association of over 300 leading global organisations, which... • addresses key issues in information risk management through research and collaboration • develops practical tools and guidance • is fully independent and driven by its Members • promotes networking within its membership.
What the ISF provides for its Members • …and much more besides!
What is the threat horizon? • A report that... • identifies new and changing threats that are likely to impact information security over the next 24 months • is written for both information security and business audiences • informs information security strategy.
Threat horizon methodology Consider the world of the future and how this may give rise to information security threats
2006 headlines • Unintentional actions will have the biggest business impacts • It’s not outside… it’s inside as well • More malware • Organised crime muscles in • Threats aren’t single anymore… they’re clustered • Look both ways – inside and out to the near horizon
Source Various, including BBC / The Register 2007 / InsideIDTheft.info And here’s the proof….
Record Mgt Terrorism Energy Compliance Political Legal Discovery Instability 2008 Economic Technical E-economy Extreme Weather Device convergence Digital convergence Organised crime New products Socio-cultural Gen Y Remote Working Home vs. work 2006 predictions for 2008
ID theft Terrorism Lack of trust Intellectual property Political Legal Electronic evidence Cyber- terrorism 2010 Economic Technical Emerging economies Complex ownership Web 2.0 Process control Organised crime Socio-cultural Solar flares Terrorism and organised crime are the only two threats to stay on the list Corporate loyalty Demo- graphics 2008 for 2010… What changed?
Harsherpenalties Protectionism Government More legislation Political Legal Privacy vs.security Inter-dependence 2011 Economic Technical Less R&D Moreoutsourcing CloudComputing Corporate /Home systems Crime Socio-cultural Encryption Internet orreality? Haves vs.have nots Homeworking What will the world look like in 2011?
The world has changed… very quickly Espionage, lack of public trust, cyber-terrorism Intellectual property, electronic evidence, identity theft Long-term threats are in the here and now Emerging economies, complex ownership, organised crime Corporate loyalty, demographics Web 2.0, solar flares, process control
Responding to a changing risk profile • Actions • Adapt to changes in the organisation’s risk profile • Reassess information risk • Use your ‘nose for risk’ • Develop a more agile new security plan ISF report about ‘Profit driven attack’
Managing down the greater impact of incidents • Actions • Change your thinking about the threats • Look beyond historical data • Develop and rehearse responses to a range of events
Keeping up with business change • Social environment(demographics, attitudes, cultures) • Business environment(activities, operations, markets) • Economic environment(credit crunch, realignment of world economy, rise of China) • Global environment(global warming, interconnectivity, competition for resources) • Technological environment(mobile phones, nanotechnology, pervasiveness) Actions • Engage with the business • Question the beliefs • Craft a new security strategy • Plan for uncertainty • Prepare for change
Surviving reductions • Information security will be affected • Spending on information security will reduce • But the reduction will lag the downturns in the economy and organisation • New threats and risks will emerge • Sophistication will increase Nearly two thirds of ISF Members (63%) expect their budget to decrease in 2009 Source: ISF MX Quick Vote Actions • Revise information security arrangements
Building for the future • Actions • Prepare for increased compliance requirements • Maintain level of resources • Make best use of your networks, membership and professional bodies
Beyond the horizon • Biometrics • Embedded chips • Quantum computing • SPIT • Nano technology • AI • New computing interfaces • Everyone connected to everything
What do I do now? • Re-assess the risks to your organisation and its information • Inside and outside… • Change your thinking about threats • Don’t rely on trends or historical data • Revise your information security arrangements • Question ‘security as usual’ • Focus on the basics • That includes people, not just technology! • Prepare for the future • Be ready to support initiatives such as cloud computing
Questions Jason Creasey Head of Research Information Security Forum Tel: +44 (0)207 213 1745 E-mail: jason.creasey@securityforum.org Web: www.securityforum.org