SlideShare a Scribd company logo
1 of 45
Download to read offline
Top Security
                              Threats
                             for 2011
Thursday, March 31, 2011
Presenter

                                Eric Kitchens, CISSP/CISA
                                  eric@thegarlandgroup.net




Thursday, March 31, 2011
riskkey.com




                 • IT Audit / Security Testing
                 • Continuous Compliance
                 • Collaboration Consulting




Thursday, March 31, 2011
What Are The
                           Top Security Threats
                                for 2011?


Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.


                       New and emerging threats often are combinations of “old” threats.




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.


                       New and emerging threats often are combinations of “old” threats.


                                         It’s never too late to mitigate.



Thursday, March 31, 2011
Something Old...
                           Threats that have been with us for many years
                              and will be with us for years to come.




Thursday, March 31, 2011
Something Old...
                           Threats that have been with us for many years
                              and will be with us for years to come.


                 • Mobile Devices




Thursday, March 31, 2011
Something Old...
                            Threats that have been with us for many years
                               and will be with us for years to come.


                 • Mobile Devices
                  • Cloud Computing & Virtualization



Thursday, March 31, 2011
Something Old...
                            Threats that have been with us for many years
                               and will be with us for years to come.


                 • Mobile Devices
                  • Cloud Computing & Virtualization
                  • Application Vulnerabilities

Thursday, March 31, 2011
Mobile Devices




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore




Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore
           • Merging Business & Personal Use



Thursday, March 31, 2011
Mobile Devices

           • Various Platforms
           • Mal-Ware in the AppStore
           • Merging Business & Personal Use
           • Lost or Stolen Devices & Data

Thursday, March 31, 2011
Cloud Computing




Thursday, March 31, 2011
Cloud Computing

              • Expanding Scope of Virtualization




Thursday, March 31, 2011
Cloud Computing

              • Expanding Scope of Virtualization
              • Outsourced Applications and Services



Thursday, March 31, 2011
Application Vulnerabilities




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing
                  • Application Specific Vulnerabilities are on the Rise




Thursday, March 31, 2011
Application Vulnerabilities

                  • Operating System Vulnerabilities are Decreasing
                  • Application Specific Vulnerabilities are on the Rise
                  • Evaluate Automated Patching Tools for All Applications & Systems



Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems




Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats




Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats
              • Hacktivisim



Thursday, March 31, 2011
Something New...
                           Not “new” but emerging and evolving into new problems



              • Advanced Persistent Threats
              • Hacktivisim
              • Cyberterrorism


Thursday, March 31, 2011
Advanced Persistent Threats




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time




Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time
                  • Adapts to Defenses and Mitigation Strategies



Thursday, March 31, 2011
Advanced Persistent Threats

                  • Google and RSA Are Recent Examples
                  • Executed Over Extended Period of Time
                  • Adapts to Defenses and Mitigation Strategies
                  • Baselining and Monitoring are Essential for Defense

Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes
                • Tools are Freely Available to Non-Technical Users



Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                • DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                • Disrupting Services for Ideological Purposes
                • Tools are Freely Available to Non-Technical Users
                • Be Aware of Outsourced Relationships and
                       Higher Risk Customers They Service


Thursday, March 31, 2011
Something Borrowed...




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats




Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats
                       • Data Classification and Control



Thursday, March 31, 2011
Something Borrowed...
                       “I swear, I meant to return all the confidential data on my USB drive
                                          after I was done ‘borrowing’ it!”


                       • Insider Threats
                       • Data Classification and Control
                       • USB Storage Devices

Thursday, March 31, 2011
Questions & Answers




Thursday, March 31, 2011
Thanks.
                           Email: eric@thegarlandgroup.net

                           Web: http://www.thegarlandgroup.net




Thursday, March 31, 2011

More Related Content

Similar to Garland Group - Top Security Threats of 2011

Android Apps Success and Store trend
Android Apps Success and Store trendAndroid Apps Success and Store trend
Android Apps Success and Store trend01Booster
 
Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience Erik Eliason
 
Critical aspects of digital tools in learning processes during the near future
Critical aspects of digital tools in learning processes  during the near futureCritical aspects of digital tools in learning processes  during the near future
Critical aspects of digital tools in learning processes during the near futureTeemu Leinonen
 
Social Media-Interacting With Your Stakeholders
Social Media-Interacting With Your StakeholdersSocial Media-Interacting With Your Stakeholders
Social Media-Interacting With Your StakeholdersReginaPhelps
 
Information Visualization
Information VisualizationInformation Visualization
Information VisualizationPeter Dalsgaard
 
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011Seismonaut
 

Similar to Garland Group - Top Security Threats of 2011 (7)

Android Apps Success and Store trend
Android Apps Success and Store trendAndroid Apps Success and Store trend
Android Apps Success and Store trend
 
Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience Wireframes, User Interfaces, and User Experience
Wireframes, User Interfaces, and User Experience
 
Critical aspects of digital tools in learning processes during the near future
Critical aspects of digital tools in learning processes  during the near futureCritical aspects of digital tools in learning processes  during the near future
Critical aspects of digital tools in learning processes during the near future
 
Social Media-Interacting With Your Stakeholders
Social Media-Interacting With Your StakeholdersSocial Media-Interacting With Your Stakeholders
Social Media-Interacting With Your Stakeholders
 
Information Visualization
Information VisualizationInformation Visualization
Information Visualization
 
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
Peter Dalsgaard, information visualization, Headstart Morgenseminar 31.3.2011
 
Social Media Evolved
Social Media EvolvedSocial Media Evolved
Social Media Evolved
 

More from Brad Garland

ICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial ServicesICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial ServicesBrad Garland
 
FFIEC Regulatory Training
FFIEC Regulatory TrainingFFIEC Regulatory Training
FFIEC Regulatory TrainingBrad Garland
 
Next Generation Banking with Generation Y
Next Generation Banking with Generation YNext Generation Banking with Generation Y
Next Generation Banking with Generation YBrad Garland
 
Banking on Social Media
Banking on Social MediaBanking on Social Media
Banking on Social MediaBrad Garland
 
Web2.0 and your Bank - The Consumers
Web2.0 and your Bank - The ConsumersWeb2.0 and your Bank - The Consumers
Web2.0 and your Bank - The ConsumersBrad Garland
 
Web 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The TechnologyWeb 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The TechnologyBrad Garland
 

More from Brad Garland (7)

ICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial ServicesICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial Services
 
Community Is King
Community Is KingCommunity Is King
Community Is King
 
FFIEC Regulatory Training
FFIEC Regulatory TrainingFFIEC Regulatory Training
FFIEC Regulatory Training
 
Next Generation Banking with Generation Y
Next Generation Banking with Generation YNext Generation Banking with Generation Y
Next Generation Banking with Generation Y
 
Banking on Social Media
Banking on Social MediaBanking on Social Media
Banking on Social Media
 
Web2.0 and your Bank - The Consumers
Web2.0 and your Bank - The ConsumersWeb2.0 and your Bank - The Consumers
Web2.0 and your Bank - The Consumers
 
Web 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The TechnologyWeb 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The Technology
 

Recently uploaded

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Garland Group - Top Security Threats of 2011

  • 1. Top Security Threats for 2011 Thursday, March 31, 2011
  • 2. Presenter Eric Kitchens, CISSP/CISA eric@thegarlandgroup.net Thursday, March 31, 2011
  • 3. riskkey.com • IT Audit / Security Testing • Continuous Compliance • Collaboration Consulting Thursday, March 31, 2011
  • 4. What Are The Top Security Threats for 2011? Thursday, March 31, 2011
  • 5. Something Old, Something New, Something Borrowed... Thursday, March 31, 2011
  • 6. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. Thursday, March 31, 2011
  • 7. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. New and emerging threats often are combinations of “old” threats. Thursday, March 31, 2011
  • 8. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. New and emerging threats often are combinations of “old” threats. It’s never too late to mitigate. Thursday, March 31, 2011
  • 9. Something Old... Threats that have been with us for many years and will be with us for years to come. Thursday, March 31, 2011
  • 10. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices Thursday, March 31, 2011
  • 11. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices • Cloud Computing & Virtualization Thursday, March 31, 2011
  • 12. Something Old... Threats that have been with us for many years and will be with us for years to come. • Mobile Devices • Cloud Computing & Virtualization • Application Vulnerabilities Thursday, March 31, 2011
  • 14. Mobile Devices • Various Platforms Thursday, March 31, 2011
  • 15. Mobile Devices • Various Platforms • Mal-Ware in the AppStore Thursday, March 31, 2011
  • 16. Mobile Devices • Various Platforms • Mal-Ware in the AppStore • Merging Business & Personal Use Thursday, March 31, 2011
  • 17. Mobile Devices • Various Platforms • Mal-Ware in the AppStore • Merging Business & Personal Use • Lost or Stolen Devices & Data Thursday, March 31, 2011
  • 19. Cloud Computing • Expanding Scope of Virtualization Thursday, March 31, 2011
  • 20. Cloud Computing • Expanding Scope of Virtualization • Outsourced Applications and Services Thursday, March 31, 2011
  • 22. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing Thursday, March 31, 2011
  • 23. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing • Application Specific Vulnerabilities are on the Rise Thursday, March 31, 2011
  • 24. Application Vulnerabilities • Operating System Vulnerabilities are Decreasing • Application Specific Vulnerabilities are on the Rise • Evaluate Automated Patching Tools for All Applications & Systems Thursday, March 31, 2011
  • 25. Something New... Not “new” but emerging and evolving into new problems Thursday, March 31, 2011
  • 26. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats Thursday, March 31, 2011
  • 27. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats • Hacktivisim Thursday, March 31, 2011
  • 28. Something New... Not “new” but emerging and evolving into new problems • Advanced Persistent Threats • Hacktivisim • Cyberterrorism Thursday, March 31, 2011
  • 30. Advanced Persistent Threats • Google and RSA Are Recent Examples Thursday, March 31, 2011
  • 31. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time Thursday, March 31, 2011
  • 32. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time • Adapts to Defenses and Mitigation Strategies Thursday, March 31, 2011
  • 33. Advanced Persistent Threats • Google and RSA Are Recent Examples • Executed Over Extended Period of Time • Adapts to Defenses and Mitigation Strategies • Baselining and Monitoring are Essential for Defense Thursday, March 31, 2011
  • 35. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. Thursday, March 31, 2011
  • 36. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes Thursday, March 31, 2011
  • 37. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes • Tools are Freely Available to Non-Technical Users Thursday, March 31, 2011
  • 38. Cyber-Terrorism & Hacktivism • DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. • Disrupting Services for Ideological Purposes • Tools are Freely Available to Non-Technical Users • Be Aware of Outsourced Relationships and Higher Risk Customers They Service Thursday, March 31, 2011
  • 40. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” Thursday, March 31, 2011
  • 41. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats Thursday, March 31, 2011
  • 42. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats • Data Classification and Control Thursday, March 31, 2011
  • 43. Something Borrowed... “I swear, I meant to return all the confidential data on my USB drive after I was done ‘borrowing’ it!” • Insider Threats • Data Classification and Control • USB Storage Devices Thursday, March 31, 2011
  • 45. Thanks. Email: eric@thegarlandgroup.net Web: http://www.thegarlandgroup.net Thursday, March 31, 2011