SlideShare una empresa de Scribd logo
1 de 17
© 2014 IBM Corporation 
BusinessConnect 
A New Era of Smart 
Hotlandskapet på Internet 
Ola Wittenby 
ola.wittenby@se.ibm.com 
Stockholm 2014-10-07
A New Era of Smart 
© 2014 2 
IBM Corporation
A New Era of Smart 
A new security reality is here 
61% 
of organizations say 
data theft and cybercrime 
are their greatest threats 
2012 IBM Global Reputational Risk & IT Study 
$3.5M 
Average cost of a 
data breach 
2014 Cost of Data Breach, Ponemon Institute 
70% 
of security 
executives have cloud and 
mobile security concerns 
2013 IBM CISO Survey 
83% 
have difficulty finding the 
security skills they need 
2012 ESG Research 
85 
45 
of enterprises 
614% security tools from 
Mobile malware growth 
in just one year 
2012 - 2013 Juniper Mobile Threat Report 
vendors 
IBM client example 
© 2014 3 IBM Corporation
A New Era of Smart 
© 2014 4 
IBM Corporation
A New Era of Smart 
We are in an era of continous breaches 
2011 2012 2013 
SQL 
injection 
Spear 
phishing 
Attack types 
Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014 
Near Daily Leaks 
of Sensitive Data 
40% increase 
in reported data 
breaches and incidents 
Relentless Use 
of Multiple Methods 
500,000,000+ records 
were leaked, while the future 
shows no sign of change 
DDoS Third-party 
software 
Physical 
access 
Malware XSS Watering 
hole 
Undisclosed 
Note: Size of circle estimates relative impact of incident in terms of cost to business. 
© 2014 5 
IBM Corporation
A New Era of Smart 
The cybercrime ecosystem 
Developer / Malware writer 
Exploiter / Distributor 
•Spam 
•Phishing 
•Pharming 
•Social Engineering 
Hosting / Outsourcing 
© 2014 6 
IBM Corporation
A New Era of Smart 
One-day attack methods demonstrate how quickly attackers rush to 
exploit a vulnerability 
© 2014 7 
IBM Corporation
A New Era of Smart 
Attackers optimize and refine target selection 
© 2014 8 
IBM Corporation
A New Era of Smart 
Effectively targeting end-users 
Watering Hole Malvertising 
 Attacker injects malware 
on special interest website 
 Vulnerable niche users 
exploited 
 Attacker injects malware 
on ad network 
 Malicious ad embedded on 
legitimate websites 
 Vulnerable users exploited 
© 2014 9 
IBM Corporation
A New Era of Smart 
Spam continues to be a main channel for malware into companies 
In March 2014, we saw the highest levels of spam 
measured during the last two and a half years. 
© 2014 10 
IBM Corporation
A New Era of Smart 
Significant increase in Java vulnerabilities 
© 2014 11 
IBM Corporation
A New Era of Smart 
Weponized content focused on end-user applications 
© 2014 12 
IBM Corporation
A New Era of Smart 
Attackers exploit application vulnerabilities to access sensitive data 
50% of web applications they have deployed 
Test and Remediate 
AppVulns 
 Not testing puts the 
organization at risk. 
 Broken authentication can 
result in that the attacker 
looks like a legitimate 
user. 
of organizations underestimate the number 
Protect Web 
Servers 
 Bugs means increased 
risks for loss of critical 
information. 
 Mitigating potential 
damages makes cleanup 
a challenge. 
Expect the 
Unexpected 
 Plan incident 
response for the 
unkown rather than 
the known. 
© 2014 13 
IBM Corporation
A New Era of Smart 
Attackers use exploit kits to deliver payload 
Styx Exploit Kit 
Rising in popularity 
Successful in 
exploiting IE and 
Firefox on Windows 
© 2014 14 
IBM Corporation
A New Era of Smart 
The cybercrime ecosystem 
Criminals just buy what they need… 
•Weaponized content (Malware) 
•Delivery (spam, phishing, pharming…) 
•Hosting 
•SLA 
Developer / Malware writer 
Exploiter / Distributor 
•Spam 
•Phishing 
•Pharming 
•Social Engineering 
Hosting / Outsourcing 
Or just rent a hacker to get what they need… 
•Industrial espionage 
•Bank fraud 
© 2014 15 
IBM Corporation
A New Era of Smart 
© 2014 16 
IBM Corporation
A New Era of Smart 
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response 
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated 
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure 
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to 
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, 
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE 
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. 
www.ibm.com/security 
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes 
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use 
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any 
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement 
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in 
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole 
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any 
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United 
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 
© 2014 17 IBM Corporation

Más contenido relacionado

La actualidad más candente

Smartphone security
Smartphone securitySmartphone security
Smartphone security
Muthu Kumar
 

La actualidad más candente (20)

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios system
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
Mobile security
Mobile securityMobile security
Mobile security
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 

Similar a Ola Wittenby - Hotlandskapet på Internet

Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 

Similar a Ola Wittenby - Hotlandskapet på Internet (20)

Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Emergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security RisksEmergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security Risks
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 

Más de IBM Sverige

Más de IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Último

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Ola Wittenby - Hotlandskapet på Internet

  • 1. © 2014 IBM Corporation BusinessConnect A New Era of Smart Hotlandskapet på Internet Ola Wittenby ola.wittenby@se.ibm.com Stockholm 2014-10-07
  • 2. A New Era of Smart © 2014 2 IBM Corporation
  • 3. A New Era of Smart A new security reality is here 61% of organizations say data theft and cybercrime are their greatest threats 2012 IBM Global Reputational Risk & IT Study $3.5M Average cost of a data breach 2014 Cost of Data Breach, Ponemon Institute 70% of security executives have cloud and mobile security concerns 2013 IBM CISO Survey 83% have difficulty finding the security skills they need 2012 ESG Research 85 45 of enterprises 614% security tools from Mobile malware growth in just one year 2012 - 2013 Juniper Mobile Threat Report vendors IBM client example © 2014 3 IBM Corporation
  • 4. A New Era of Smart © 2014 4 IBM Corporation
  • 5. A New Era of Smart We are in an era of continous breaches 2011 2012 2013 SQL injection Spear phishing Attack types Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014 Near Daily Leaks of Sensitive Data 40% increase in reported data breaches and incidents Relentless Use of Multiple Methods 500,000,000+ records were leaked, while the future shows no sign of change DDoS Third-party software Physical access Malware XSS Watering hole Undisclosed Note: Size of circle estimates relative impact of incident in terms of cost to business. © 2014 5 IBM Corporation
  • 6. A New Era of Smart The cybercrime ecosystem Developer / Malware writer Exploiter / Distributor •Spam •Phishing •Pharming •Social Engineering Hosting / Outsourcing © 2014 6 IBM Corporation
  • 7. A New Era of Smart One-day attack methods demonstrate how quickly attackers rush to exploit a vulnerability © 2014 7 IBM Corporation
  • 8. A New Era of Smart Attackers optimize and refine target selection © 2014 8 IBM Corporation
  • 9. A New Era of Smart Effectively targeting end-users Watering Hole Malvertising  Attacker injects malware on special interest website  Vulnerable niche users exploited  Attacker injects malware on ad network  Malicious ad embedded on legitimate websites  Vulnerable users exploited © 2014 9 IBM Corporation
  • 10. A New Era of Smart Spam continues to be a main channel for malware into companies In March 2014, we saw the highest levels of spam measured during the last two and a half years. © 2014 10 IBM Corporation
  • 11. A New Era of Smart Significant increase in Java vulnerabilities © 2014 11 IBM Corporation
  • 12. A New Era of Smart Weponized content focused on end-user applications © 2014 12 IBM Corporation
  • 13. A New Era of Smart Attackers exploit application vulnerabilities to access sensitive data 50% of web applications they have deployed Test and Remediate AppVulns  Not testing puts the organization at risk.  Broken authentication can result in that the attacker looks like a legitimate user. of organizations underestimate the number Protect Web Servers  Bugs means increased risks for loss of critical information.  Mitigating potential damages makes cleanup a challenge. Expect the Unexpected  Plan incident response for the unkown rather than the known. © 2014 13 IBM Corporation
  • 14. A New Era of Smart Attackers use exploit kits to deliver payload Styx Exploit Kit Rising in popularity Successful in exploiting IE and Firefox on Windows © 2014 14 IBM Corporation
  • 15. A New Era of Smart The cybercrime ecosystem Criminals just buy what they need… •Weaponized content (Malware) •Delivery (spam, phishing, pharming…) •Hosting •SLA Developer / Malware writer Exploiter / Distributor •Spam •Phishing •Pharming •Social Engineering Hosting / Outsourcing Or just rent a hacker to get what they need… •Industrial espionage •Bank fraud © 2014 15 IBM Corporation
  • 16. A New Era of Smart © 2014 16 IBM Corporation
  • 17. A New Era of Smart Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security © Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. © 2014 17 IBM Corporation

Notas del editor

  1. A new security reality is here: Sophisticated attackers break through conventional safeguards every day. Organized criminals, hacktivists, governments and adversaries are compelled by financial gain, politics and notoriety to attack your most valuable assets. Their operations are well-funded and business-like ‒ attackers patiently evaluate targets based on potential effort and reward. Their methods are extremely targeted ‒ they use social media and other entry points to track down people with access, take advantage of trust, and exploit them as vulnerabilities. Meanwhile, negligent employees inadvertently put the business at risk via human error. Even worse, security investments of the past fail to protect against these new classes of attacks. The result is more severe security breaches more often. 61% of organizations say data theft and cybercrime are the greatest threats to their reputation (2012 Global Reputational Risk & IT Study, IBM). And the costs are staggering. By one estimate, the average cost of a breach is over $3.5 million (2014 Cost of a Data Breach Study, Ponemon Institute) <MOUSE CLICK> Cloud, mobile, social and big data drive unprecedented change. Businesses are adopting mobile, social, big data and cloud to analyze and share information at unprecedented rates. This influx of new innovation, technologies, and end-points push more and more business transactions outside company walls and completely transform enterprise security as we know it. As the traditional network perimeter around the data center permanently dissolves, it is more difficult to defend company data from the increasing gaps in security, and to verify that users accessing data are protected. In one study, 70% of security executives expressed concern about cloud and mobile security. (2013 CISO Survey, IBM) Theft or loss of mobile devices, privacy concerns associated with cloud, and accidental sharing of sensitive data are some of the key fears. (2013 Juniper Mobile Threat Report) Without dynamic protection, an organization may spend more time recovering from attacks than it does preventing them. And those who do not prepare for change are leaving their companies dangerously exposed. <MOUSE CLICK> Yesterday’s security practices are no longer sustainable Up to now, organizations have responded to security concerns by deploying a new tool to address each new risk. Now they have to install, configure, manage, patch, upgrade, and pay for dozens of non-integrated solutions with limited views of the landscape. Costly and complex, these fragmented security capabilities do not provide the visibility and coordination needed to stop today’s sophisticated attacks. Moreover, the skills and expertise needed to keep up with a constant stream of new threats is not always available. 83% of enterprises report having difficulty finding the security skills they need (2012 ESG Research). As new risks emerge, the environment will grow more complex and the skills gap wider. 49% of IT executives say that they are challenged by an inability to measure the effectiveness of their current security efforts (Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized, Forrester) and 31% of IT professionals have no risk strategy at all (2013 Global Reputational Risk & IT Study, IBM). Many security teams are simply operating in the dark.