Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Threats 2013

No description
by

simon minton

on 13 September 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Threats 2013

Cyber Threats 2013
The threat of a cyber-attack to the UK is so serious it is marked as a HIGHER threat than a nuclear attack.
NSA & FBI recently said cyber crime is fast becoming a threat to SURPASS terrorism in the US, announcing that it has changed its priorities to focus on cyber security as "a National Security Threat"
The US conducted 231 cyber operations in 2011
$136 billion
30,000 computers destroyed
30,000 computers destroyed
Banking
Media
Retail
Transport
£7.6bn - Industrial espionage
£2.2bn - Extortion
£1.3bn - Online Theft
£1.1bn - Loss of customer data
£9.2bn - IP theft
$400m / year
9m adults had accounts attacked
8% of population lost money to cybercrime
2.3% lost more than £10k
27% of 18-24 yr olds suffered hacking attack
online scams: £1.4bn
Identity Theft: £1.7bn
What we are doing is NOT working. We need to review WHAT we are doing and WHY.
We need to re-evaluate everything, from passwords to pentests to firewalls to DLP.

We have to stop doing the SAME thing over and over again. We have to stop being INSANE.

My prediction? Companies will start looking for alternative security technologies to
augment or outright replace many of the technologies that have FAILED time and time again.
John Strand
Contributor to NSA, FBI, NASA and DefCon and Snr researcher at SANS Institute
Next Gen Firewall
Next Gen IPS
Buying trends
APT
Zero Trust Model
Active Defence
Assume you have been breached
Retaliate against attackers
Build intel on your attackers
Deception & containment
Malware Sandboxing
APT detection & remediation
&
2011 statistics
UK Cabinet Office - 2011
Source: Wikileaks
Simon Minton
MarkerAdvisors
Simon@markeradvisors.com
Are Syrian targets already under cyber attack from the US?
Source: UK Cabinet Office
Asymmetric attacks
New approach needed?
Intelligence
local detection
Global remediation
Big Data
Data mining
Best-of-breed
Talent Shortage
MSPs building own security clouds
Integrated solutions
Hybrid
Security Tech trends
De-perimeterization
Real-time traffic inspection
Identification
Forensics
Developed FOR the cloud
Different types of 'Cloud Security'
Delivered BY the cloud
SaaS
email
Archiving
SSO
Application security
ID
Network Security
encryption
capEx -> opEx
Computing as a Utility
Converged Infrastructure
Servers
Storage
Networking
Automation
Orchestration
Shared Services
Virtualisation
SOA
Cyber Threats
national
corporate
individual
Buying Trends
Anatomy of an ATP
Tech Trends
Next Big Thing
Avg Security Growth
Advanced Persistent Threat
Advanced persistent threat (APT) usually refers
to a group, such as a government, with both the capability and the intent to persistently and effectively target a specific entity
APT attacks are executed by coordinated human actions, rather than by mindless and automated pieces of code. The operators have a specific objective and are skilled, motivated, organized
and typically well funded.
What is the 'Cloud' ?
Public
Private
Hybrid
Security Buying Trends
Cloud Solution Trends
UK most attacked country in EU
US Cyber Command
Mobility
Real time detection
Gain intel on adversary
Flexible response
Disseminate intel gained on adversary
Keeps your website safe from DoS, SQL Injection, advanced malware & APTs
Full transcript