SlideShare a Scribd company logo
1 of 22
Download to read offline
ISO & SECURITY MASHUP Seminar: Organized by
Asian Intelligent Information Technology Co., Ltd. &
E-Cqurity (Thailand) Co., Ltd.




                                     IT Security
                                    Trends 2013


Assoc. Prof. Dr. Thanachart Numnonda
Executive Director
IMC Institute
21 January 2013
Gartner Top 10 Strategic Technology Trends
           2012                             2013
Media tablets and beyond             Mobile Device Battles
Mobile-centric applications and      Mobile Applications and HTML5
interfaces                           Personal Cloud
Social &contextual user experience   Enterprise App Stores
Application stores and marketplace   The Internet of Things
The Internet of everything           Hybrid IT and Cloud Computing
Next-generation analytics            Strategic Big Data
Big data                             Actionable Analytics
In-memory computing                  In Memory Computing
Extreme low-energy servers           Integrated Ecosystems
Cloud computing
                                                                     2
Cloud Computing       Mobile Computing




Social Technologies       Information    3
Bring Your Own Devices (BYOD)




                                4
Public Personal Cloud




                        5
“Social computing is moving from
being just on the outside of the organization
to being at the core of business operations.”


Peter Sondergaard, senior vice president at Gartner, 2012




                                                            6
“Big data currently has the most significant impact
 in social network analysis and content analytics
      with 45% of new spending each year.”


                    Gartner, 2012




                                                      7
Sign of the Times

1995: Employee Car

2005: Employee Cell Phone

2015: Employee Computer / Devices




                                    8
Mobile in Enterprise

Gartner forecasts that in 2016, half of all non-PC
devices will be purchased by employees. By the end
of the decade, half of all devices in business will be
purchased by employees.
By 2016, 60% of large enterprises will implement
limited access network zones to limit the connectivity
of personally owned mobile devices.
Gartner predicts that through 2017, 90% of
enterprises will have two or more mobile operating
systems to support.
                                                         9
Security Trends

  Security investments are going to dramatically
  increase. An already large security market is about to
  get much bigger, growing by 56% from current levels
  in five years time, while cloud security will almost
  triple.
  More than 50% of firms currently providing identity
  access management as a service (IAMaaS) and
  cloud-based IAM solutions will be acquired by larger
  service providers by year-end 2015.

                                                           10
Source :http://www.networkworld.com/
Security Trends
  Through 2013, 80% of cloud security incidents will be
  due to administrative error by cloud service providers
  or user management of cloud services.
  For low-security environments, or for workloads that
  have simple security requirements, relying on the
  security built into structure or into the public cloud
  service will be good enough
  At the high end, security will be kept separate from
  private or public cloud infrastructure -- just as we did
  when internal networks were virtualized
                                                             11
Source :http://www.networkworld.com/
Security Trends
  The vast middle will compromise and run security
  workloads in the private cloud and public cloud
  environments.
  There is an urgent need for companies to separate
  personal and business operations on consumer
  smartphones and tablets (both company- and user-
  owned)




                                                      12
Source http://www.networkworld.com/
Seven Top Security Trends
        For 2013




                            13
Mainstream Cloud and Mobile
          Adoption Seeks Security




                                         14
Source http://www.informationweek.com/
Businesses Begin Sandboxing
              Smartphone Apps




                                         15
Source http://www.informationweek.com/
Cloud Offers Unprecedented
                Attack Strength




                                         16
Source http://www.informationweek.com/
Post-Flashback, Cross-Platform
              Attacks Increase




                                         17
Source http://www.informationweek.com/
Destructive Malware Targets Critical
              Infrastructure




                                          18
Source http://www.informationweek.com/
Hackers Target QR Codes, TecTiles




                                         19
Source http://www.informationweek.com/
Digital Wallets Become
                Cybercrime Targets




                                         20
Source http://www.informationweek.com/
Summary

Mega IT Trends : Cloud Computing, Mobile
Technology, Social Technology and Information.
Enterprise IT Impact: BYOD, Personal Cloud,
Social Enterprise.
7 Top IT Security Trends: Mostly based on CSMI:
 – Cloud Security, Mobile Security, Cross
   Platform, Mobile Wallet, QR Code, Critical
   Infrastructure

                                                  21
Thank you

thanachart@imcstitute.com
www.facebook.com/imcinstitute
www.slideshare.net/imcinstitute
                                  22

More Related Content

What's hot

What's hot (20)

Security Everywhere in the Digital Economy
Security Everywhere in the Digital EconomySecurity Everywhere in the Digital Economy
Security Everywhere in the Digital Economy
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Forbes Article
Forbes ArticleForbes Article
Forbes Article
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial Services
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a Hospital
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018
 
Security economics
Security economicsSecurity economics
Security economics
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
The Next Five Years
The Next Five YearsThe Next Five Years
The Next Five Years
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
 

Viewers also liked

Viewers also liked (20)

Addressing CIP
Addressing CIPAddressing CIP
Addressing CIP
 
Thailand Investment Review, January 2017
Thailand Investment Review, January 2017Thailand Investment Review, January 2017
Thailand Investment Review, January 2017
 
Thailand Investment Review,February 2017
Thailand Investment Review,February 2017Thailand Investment Review,February 2017
Thailand Investment Review,February 2017
 
CIO Trends 2011
CIO Trends 2011CIO Trends 2011
CIO Trends 2011
 
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
 
พิชิตคู่แข่ง แซงหน้าด้วยไอที ยุคใหม่
พิชิตคู่แข่ง แซงหน้าด้วยไอที ยุคใหม่พิชิตคู่แข่ง แซงหน้าด้วยไอที ยุคใหม่
พิชิตคู่แข่ง แซงหน้าด้วยไอที ยุคใหม่
 
การบริหารจัดการเทคโนโลยีสารสนเทศยุคใหม่ และผลกระทบกับองค์กร
การบริหารจัดการเทคโนโลยีสารสนเทศยุคใหม่ และผลกระทบกับองค์กรการบริหารจัดการเทคโนโลยีสารสนเทศยุคใหม่ และผลกระทบกับองค์กร
การบริหารจัดการเทคโนโลยีสารสนเทศยุคใหม่ และผลกระทบกับองค์กร
 
Technology Trends 2011
Technology Trends 2011Technology Trends 2011
Technology Trends 2011
 
Mobile Apps & Social Network Trends : Impact on Airline Business
Mobile Apps & Social Network Trends : Impact on Airline BusinessMobile Apps & Social Network Trends : Impact on Airline Business
Mobile Apps & Social Network Trends : Impact on Airline Business
 
Technology Trends 2014 and Beyond
Technology Trends 2014 and BeyondTechnology Trends 2014 and Beyond
Technology Trends 2014 and Beyond
 
Software Development Trends 2014
Software Development Trends 2014Software Development Trends 2014
Software Development Trends 2014
 
3G กับอนาคต ธุรกิจแอพพลิเคชันในเมืองไทย
3G กับอนาคต ธุรกิจแอพพลิเคชันในเมืองไทย3G กับอนาคต ธุรกิจแอพพลิเคชันในเมืองไทย
3G กับอนาคต ธุรกิจแอพพลิเคชันในเมืองไทย
 
IT Management Trends on Enterprise 2.0
IT Management Trends on Enterprise 2.0IT Management Trends on Enterprise 2.0
IT Management Trends on Enterprise 2.0
 
Software Park Thailand : The New Challenge (NEC2011)
Software Park Thailand : The New Challenge (NEC2011)Software Park Thailand : The New Challenge (NEC2011)
Software Park Thailand : The New Challenge (NEC2011)
 
นวัตกรรมที่ควรเรียนรู้ในศตวรรษที่ 21
นวัตกรรมที่ควรเรียนรู้ในศตวรรษที่ 21นวัตกรรมที่ควรเรียนรู้ในศตวรรษที่ 21
นวัตกรรมที่ควรเรียนรู้ในศตวรรษที่ 21
 
Trends of Smartphone
Trends of SmartphoneTrends of Smartphone
Trends of Smartphone
 
ICT Vision and Technologies Adoption across Thailand
ICT Vision and Technologies Adoption across ThailandICT Vision and Technologies Adoption across Thailand
ICT Vision and Technologies Adoption across Thailand
 
การใช้เทคโนโลยี 3G กับงานด้านสังคม
การใช้เทคโนโลยี 3G  กับงานด้านสังคมการใช้เทคโนโลยี 3G  กับงานด้านสังคม
การใช้เทคโนโลยี 3G กับงานด้านสังคม
 
Cloud Computing "Risk Driver vs Value Driver" Two Sides of the Same Coin
Cloud Computing  "Risk Driver vs Value Driver"  Two Sides of the Same CoinCloud Computing  "Risk Driver vs Value Driver"  Two Sides of the Same Coin
Cloud Computing "Risk Driver vs Value Driver" Two Sides of the Same Coin
 
Summary Report on "Emerging Technology: Thai IT Professional Readiness Survey"
Summary Report on "Emerging Technology: Thai IT Professional Readiness Survey"Summary Report on "Emerging Technology: Thai IT Professional Readiness Survey"
Summary Report on "Emerging Technology: Thai IT Professional Readiness Survey"
 

Similar to IT Security Trends 2013

PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
Technology Trends 2012
Technology Trends 2012Technology Trends 2012
Technology Trends 2012
NECIndia
 
How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLead
Arup Das
 

Similar to IT Security Trends 2013 (20)

Technology Trends 2013
Technology Trends 2013Technology Trends 2013
Technology Trends 2013
 
Impact of cloud computing to Asian IT Industry
Impact of cloud computing  to Asian IT IndustryImpact of cloud computing  to Asian IT Industry
Impact of cloud computing to Asian IT Industry
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
 
The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
How would cloud computing Effect to Software Industry?
How would cloud computing  Effect to Software Industry?How would cloud computing  Effect to Software Industry?
How would cloud computing Effect to Software Industry?
 
How would cloud computing Effect to Software Industry?
How would cloud computing Effect to Software Industry?How would cloud computing Effect to Software Industry?
How would cloud computing Effect to Software Industry?
 
Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
 
Technology Trends 2012
Technology Trends 2012Technology Trends 2012
Technology Trends 2012
 
Schoology cloud assignment
Schoology cloud assignmentSchoology cloud assignment
Schoology cloud assignment
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLead
 

More from IMC Institute

More from IMC Institute (20)

นิตยสาร Digital Trends ฉบับที่ 14
นิตยสาร Digital Trends ฉบับที่ 14นิตยสาร Digital Trends ฉบับที่ 14
นิตยสาร Digital Trends ฉบับที่ 14
 
Digital trends Vol 4 No. 13 Sep-Dec 2019
Digital trends Vol 4 No. 13  Sep-Dec 2019Digital trends Vol 4 No. 13  Sep-Dec 2019
Digital trends Vol 4 No. 13 Sep-Dec 2019
 
บทความ The evolution of AI
บทความ The evolution of AIบทความ The evolution of AI
บทความ The evolution of AI
 
IT Trends eMagazine Vol 4. No.12
IT Trends eMagazine  Vol 4. No.12IT Trends eMagazine  Vol 4. No.12
IT Trends eMagazine Vol 4. No.12
 
เพราะเหตุใด Digitization ไม่ตอบโจทย์ Digital Transformation
เพราะเหตุใด Digitization ไม่ตอบโจทย์ Digital Transformationเพราะเหตุใด Digitization ไม่ตอบโจทย์ Digital Transformation
เพราะเหตุใด Digitization ไม่ตอบโจทย์ Digital Transformation
 
IT Trends 2019: Putting Digital Transformation to Work
IT Trends 2019: Putting Digital Transformation to WorkIT Trends 2019: Putting Digital Transformation to Work
IT Trends 2019: Putting Digital Transformation to Work
 
มูลค่าตลาดดิจิทัลไทย 3 อุตสาหกรรม
มูลค่าตลาดดิจิทัลไทย 3 อุตสาหกรรมมูลค่าตลาดดิจิทัลไทย 3 อุตสาหกรรม
มูลค่าตลาดดิจิทัลไทย 3 อุตสาหกรรม
 
IT Trends eMagazine Vol 4. No.11
IT Trends eMagazine  Vol 4. No.11IT Trends eMagazine  Vol 4. No.11
IT Trends eMagazine Vol 4. No.11
 
แนวทางการทำ Digital transformation
แนวทางการทำ Digital transformationแนวทางการทำ Digital transformation
แนวทางการทำ Digital transformation
 
บทความ The New Silicon Valley
บทความ The New Silicon Valleyบทความ The New Silicon Valley
บทความ The New Silicon Valley
 
นิตยสาร IT Trends ของ IMC Institute ฉบับที่ 10
นิตยสาร IT Trends ของ  IMC Institute  ฉบับที่ 10นิตยสาร IT Trends ของ  IMC Institute  ฉบับที่ 10
นิตยสาร IT Trends ของ IMC Institute ฉบับที่ 10
 
แนวทางการทำ Digital transformation
แนวทางการทำ Digital transformationแนวทางการทำ Digital transformation
แนวทางการทำ Digital transformation
 
The Power of Big Data for a new economy (Sample)
The Power of Big Data for a new economy (Sample)The Power of Big Data for a new economy (Sample)
The Power of Big Data for a new economy (Sample)
 
บทความ Robotics แนวโน้มใหม่สู่บริการเฉพาะทาง
บทความ Robotics แนวโน้มใหม่สู่บริการเฉพาะทาง บทความ Robotics แนวโน้มใหม่สู่บริการเฉพาะทาง
บทความ Robotics แนวโน้มใหม่สู่บริการเฉพาะทาง
 
IT Trends eMagazine Vol 3. No.9
IT Trends eMagazine  Vol 3. No.9 IT Trends eMagazine  Vol 3. No.9
IT Trends eMagazine Vol 3. No.9
 
Thailand software & software market survey 2016
Thailand software & software market survey 2016Thailand software & software market survey 2016
Thailand software & software market survey 2016
 
Developing Business Blockchain Applications on Hyperledger
Developing Business  Blockchain Applications on Hyperledger Developing Business  Blockchain Applications on Hyperledger
Developing Business Blockchain Applications on Hyperledger
 
Digital transformation @thanachart.org
Digital transformation @thanachart.orgDigital transformation @thanachart.org
Digital transformation @thanachart.org
 
บทความ Big Data จากบล็อก thanachart.org
บทความ Big Data จากบล็อก thanachart.orgบทความ Big Data จากบล็อก thanachart.org
บทความ Big Data จากบล็อก thanachart.org
 
กลยุทธ์ 5 ด้านกับการทำ Digital Transformation
กลยุทธ์ 5 ด้านกับการทำ Digital Transformationกลยุทธ์ 5 ด้านกับการทำ Digital Transformation
กลยุทธ์ 5 ด้านกับการทำ Digital Transformation
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

IT Security Trends 2013

  • 1. ISO & SECURITY MASHUP Seminar: Organized by Asian Intelligent Information Technology Co., Ltd. & E-Cqurity (Thailand) Co., Ltd. IT Security Trends 2013 Assoc. Prof. Dr. Thanachart Numnonda Executive Director IMC Institute 21 January 2013
  • 2. Gartner Top 10 Strategic Technology Trends 2012 2013 Media tablets and beyond Mobile Device Battles Mobile-centric applications and Mobile Applications and HTML5 interfaces Personal Cloud Social &contextual user experience Enterprise App Stores Application stores and marketplace The Internet of Things The Internet of everything Hybrid IT and Cloud Computing Next-generation analytics Strategic Big Data Big data Actionable Analytics In-memory computing In Memory Computing Extreme low-energy servers Integrated Ecosystems Cloud computing 2
  • 3. Cloud Computing Mobile Computing Social Technologies Information 3
  • 4. Bring Your Own Devices (BYOD) 4
  • 6. “Social computing is moving from being just on the outside of the organization to being at the core of business operations.” Peter Sondergaard, senior vice president at Gartner, 2012 6
  • 7. “Big data currently has the most significant impact in social network analysis and content analytics with 45% of new spending each year.” Gartner, 2012 7
  • 8. Sign of the Times 1995: Employee Car 2005: Employee Cell Phone 2015: Employee Computer / Devices 8
  • 9. Mobile in Enterprise Gartner forecasts that in 2016, half of all non-PC devices will be purchased by employees. By the end of the decade, half of all devices in business will be purchased by employees. By 2016, 60% of large enterprises will implement limited access network zones to limit the connectivity of personally owned mobile devices. Gartner predicts that through 2017, 90% of enterprises will have two or more mobile operating systems to support. 9
  • 10. Security Trends Security investments are going to dramatically increase. An already large security market is about to get much bigger, growing by 56% from current levels in five years time, while cloud security will almost triple. More than 50% of firms currently providing identity access management as a service (IAMaaS) and cloud-based IAM solutions will be acquired by larger service providers by year-end 2015. 10 Source :http://www.networkworld.com/
  • 11. Security Trends Through 2013, 80% of cloud security incidents will be due to administrative error by cloud service providers or user management of cloud services. For low-security environments, or for workloads that have simple security requirements, relying on the security built into structure or into the public cloud service will be good enough At the high end, security will be kept separate from private or public cloud infrastructure -- just as we did when internal networks were virtualized 11 Source :http://www.networkworld.com/
  • 12. Security Trends The vast middle will compromise and run security workloads in the private cloud and public cloud environments. There is an urgent need for companies to separate personal and business operations on consumer smartphones and tablets (both company- and user- owned) 12 Source http://www.networkworld.com/
  • 13. Seven Top Security Trends For 2013 13
  • 14. Mainstream Cloud and Mobile Adoption Seeks Security 14 Source http://www.informationweek.com/
  • 15. Businesses Begin Sandboxing Smartphone Apps 15 Source http://www.informationweek.com/
  • 16. Cloud Offers Unprecedented Attack Strength 16 Source http://www.informationweek.com/
  • 17. Post-Flashback, Cross-Platform Attacks Increase 17 Source http://www.informationweek.com/
  • 18. Destructive Malware Targets Critical Infrastructure 18 Source http://www.informationweek.com/
  • 19. Hackers Target QR Codes, TecTiles 19 Source http://www.informationweek.com/
  • 20. Digital Wallets Become Cybercrime Targets 20 Source http://www.informationweek.com/
  • 21. Summary Mega IT Trends : Cloud Computing, Mobile Technology, Social Technology and Information. Enterprise IT Impact: BYOD, Personal Cloud, Social Enterprise. 7 Top IT Security Trends: Mostly based on CSMI: – Cloud Security, Mobile Security, Cross Platform, Mobile Wallet, QR Code, Critical Infrastructure 21