SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Outlook Briefing 2016:
Cyber Security
Charles Lim
Senior Industry Analyst, Cyber Security - Digital Transformation Practice
Frost & Sullivan Asia Pacific
Charles.Lim@frost.com
2
What happens in an Internet minute?
Proliferation of Cyber Attacks in 2015 targeted popular services
Data is the new gold, inability to secure them leads to distrust in services
3
Uber accounts have been
hacked and are being used to
secure rides in China without
their consent or knowledge
Apple had to remove more than
300 apps from its app store
infected by xCodeGhost malware,
affecting 500 million users
In the week of Black Friday,
Amazon has reportedly begun
forcibly resetting some users’
passwords over concerns
about a major breach.
54% of security professionals view
social engineering attacks through
phishing emails as the top threat
technique that they have encountered
Over one thousand email
addresses and passwords from
Spotify were possibly leaked
LinkedIn encountered a major breach of its
password database - a file containing passwords
using “linkedin” appeared in an online forum
A security researcher discovered a way to
perform remote code execution and retrieve
confidential data from Instagram and Facebook
Twitter emailed more than 20 users,
warning them they may have been
targeted by hackers ‘possibly
associated with a government’
A Vine star who makes
£2,000 per second from
his posts claims he has
been hacked, with all of his
videos deleted from his
account
Google Malaysia’s site
was hacked; visitors
were re-directed to a
hacker’s webpage
Hackers claiming to be
working on behalf of ISIS took
over the Twitter and
YouTube accounts of the
United States Central
Command
All of these attacks occurred in 2015
Compromised Skype users reported
that malicious links and messages were
sent to their contact list
Cyber attacks – fueling the international crime scene, online
100MMore than 100 million
health care records
compromised in 2015.
Medical records are worth
10 times more than credit
card information in the
dark web.
Cyber attacks – the channel for making a statement
602GbpsOn 31st Dec 2015, BBC received a
602Gbps Distributed Denial of Service
(DDoS) attack, the highest ever
recorded in history.
New World Hacking, who claimed
responsibility announced that it was a
test of their power. Their main target
are ISIS websites.
25GB LEAKEDThe Impact Team stole more than 25GB user data
from adultery website, Ashley Madison and released
the information on 18th August 2015.
The original intention was to force Avid Life Media to
shut down the website, and stop online adultery.
“Indonesia experiences around 50,000 cyber attacks every day. That makes
it the second-most targeted country for cyber attack after Vietnam.”
- Yono Reksoprodj, advisor to Minister for Political, Legal and Security Affairs Tedjo Edhy Purdijatno
Speaking on Indonesia’s National Cyber Agency 8th Jun 2015
>50,000 ATTACKS
“We don’t believe any cyberdefense is fail proof. But a strong, well
thought out strategy, coupled with a rapid ability for a bank to understand
when its systems have been maliciously penetrated and swiftly take the
necessary actions, such as isolating the attack, is key to a successful
cybersecurity strategy.”
- Stuart Plesser, Standard & Poor’s
Press statement pertaining to possible downgrade of banks’ ratings,
if it is believed to be ill-prepared to withstand cyber attacks.
7
The need to focus on Industrial Control Systems Security as priority
8
Security Challenges within Internet of Things
Source: Frost & Sullivan
Connected cars has been
proven to be hacked in
recent times, however the
actual impact is to the
driver’s safety and are at a
very nascent stage of
security that is acted now by
automobile manufacturers.
Connected homes, which
are developed with the
use of smart consumer
appliances such as
wireless fridges, lighting,
and thermostats have
limited impacts and are
not desirable targets.
Industrial Control Systems, which
automates most critical infrastructures
are now going through an active
transformation to connect to the Internet,
and have been victims of attacks,
extortion where any successful attack
will cause a severe impact to citizens
nationwide.
Cyber Attacks Shift Towards Physical Systems
Industrial Control Systems in operational technology creating new points of vulnerabilities
9
97%
3%
Number of Internet-connected ICS devices,
August 2015, Asia Pacific
Connected Devices
Vulnerable Devices
Source: Asia-Pacific Industrial Control Systems Security Report, Frost & Sullivan
N=3087
BLACKOUTto thousands of homes in Western Ukraine,
using the BlackEnergy malware to attack
electric substations. it was reportedly
developed by Moscow-backed group,
Sandworm on 23rd Dec 2015.
Subsequently, its Kiev Airport was attacked
by the same malware during Jan 2016.
Investigations are ongoing.
Case analysis – Industrial Control Systems Security
The need to protect SCADA (Supervisory Control and Data Acquisition) systems beyond
the “air gap” concept has been elevated since the 2011 Stuxnet APT attack. Critical
infrastructures using ICS systems and needs to raise the awareness and knowhow of how
to protect these systems as a priority when these systems get connected to the Internet.
Present:
“Air Gap”
Future:
The Internet
Human Machine Interface (HMI)
SCADA,
PLCS
Speed: 500 r/min
Business networks,
connected to the Internet
Industrial networks that runs on
local area networks separated
from the Internet, however still
vulnerable to attacks
Stuxnet malware
installed in USB
drive
External
contractors’
laptop
Information Technology Operational Technology
Graphic source: Vector Open Stock 10Source: Frost & Sullivan
Operationalizing the 3C’s for Cyber Security
Cyber Resilience
Risks & Business
Impacts
Cyber Intelligence
Knowledge and correlation of all
threats in the organization
Cyber Protection
Building the right prevention base
“Security by Design”
11Source: Frost & Sullivan
Threat Response Adaptive Core Ecosystem (TRACE): Identifying the essentials
Frost & Sullivan believes that adopting a platform approach can operationalize
the vision of a holistic security strategy, comprising the right balance between
security mindsets, tools and skill sets.
Access Management Endpoints Web Assets Cloud App
Security
Content
Integrated Security
Appliances
Advanced Threat
Prevention
Human Factor
Mitigation
Vulnerability
Management
Security
Analytics
T R A C E
12
Source: Frost & Sullivan
Projected growth of security solutions in ASEAN, CY2015 (CAGR=20.8%)
Managed Security Services Market Forecast Analysis
-
5.0
10.0
15.0
20.0
25.0
30.0
0.0
100.0
200.0
300.0
400.0
500.0
600.0
2014 2015 2016 2017 2018 2019 2020
Revenue($Million)
GrowthRate(%)
Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
Projected growth of security solutions in Indonesia, CY2015 (CAGR=27.1%)
Managed Security Services Market Forecast Analysis
-
5.0
10.0
15.0
20.0
25.0
30.0
35.0
40.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
2014 2015 2016 2017 2018 2019 2020
Revenue($Million)
GrowthRate(%)
Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
Network security adoption in Southeast Asia
0.0 20.0 40.0 60.0 80.0 100.0 120.0
Rest of
ASEAN
Philippines
Vietnam
Thailand
Indonesia
Malaysia
Singapore
CY2015 Q3 YTD
CY2014 Total
Network Security Tracker, 2015 QTD Market Size (US$, M)
Indonesia achieved one of the highest growth rates at 30% YoY (Q3 QTD)
Indonesia
Network Security, Indonesia (US$, M)
2014 Q3 QTD 2015 Q3 QTD
N = 13,930 qualified information security professionals globally. 10% of
respondents are Asia Pacific
44%
49%
52%
72%
75%
Automated identity management
software
Web security applications
Policy management and audit tools
Improved intrusion detection and
prevention technologies
Network monitoring and intelligence
Top 5 Technologies that Significantly Improve Security
(Percent of Survey Respondents)
18%
23%
35%
Use of Advanced Analytics for
Detection of Advanced Malware
(Percent of Survey
Respondents)
No Plans
Evaluating or Selecting a Solution(s)
Implemented or Implementing
2015 (ISC)2 Global information Security Workforce Study
by Frost & Sullivan
17
“How do you really handle all these… big data?”
- VP for Security Infrastructure, leading telco provider, Indonesia
“We have figured out using using our own designed algorithms across
collected logs, to decipher insider threats”
- Chief Security Officer, leading technology vendor
Opinions from the ground
Observation of trends in Security Analytics market
Observations in the security analytics players in APAC
Sold off their IPS offerings, may focus
in other enterprise security products
such as SIEM tools
Integration with endpoint security,
correlation of packets and logs
Launch of X-force exchange,
integration of product and services
business units
Observation of trends in Security Analytics market
Observations in the security analytics / threat intelligence players in APAC
Focus on forensics and incident
response capabilities
User behavior analytics using
machine learning systems and
algorithms to identify fraud
Correlation of business and
security intelligence. Position to
block against APT attacks
Empowering the cyber defenses in Indonesia
Frost & Sullivan’s End User Research and Advisory Practice
Circular, 4G LTE Vulnerability
Research papers – Frost
Industry Quotient (FIQ) and
Market insights
Threat Intelligence AlertsCyber Security Threats and
Solutions Briefings
Cyber Security Outlook for 2016
Building the required capabilities for Cyber Resiliency
21
Improve Cyber
Defense in Critical
Infrastructures
1
Human expertise
and foster
collaboration
2
• Increase of Cyber Security Operation Centers in
the Critical infrastructures.
• Compliance guidelines to ensure cyber resiliency
in both business (IT) and operations (OT)
3
How companies are respondingHow companies are responding
• Cyber security training
• Sharing of intelligence amongst industries
• Setting up cyber security committees
Build a holistic
defense beyond the
organization
• Vendors/contractors to meet security
standards in the process of mitigating chain-
of-trust attacks.
Cyber Security Outlook for 2016
Building the required capabilities for Cyber Resiliency
22
Investments into
analytics to improve
accuracy and speed
4
5
• Big data analytics for multiple sources of threat
feeds will become the common concern and
more accurate judgment through automated
algorithms will be needed.
6
How companies are respondingHow companies are responding
• Enterprises will switch from ‘adopting cyber
security for their cloud setup’ to ‘adopting
cloud as part of their cyber security strategy’.
Convergence
security concepts to
be introduced
• Convergence of threats & detection of fraud
between physical and cyber systems
• Developments of convergence security in
smart cities.
Adopting cloud
security as a
strategy
Frost & Sullivan, the Growth Partnership Company, works in collaboration with
clients to leverage visionary innovation that addresses the global challenges and
related growth opportunities that will make or break today’s market participants.
For more than 50 years, we have been developing growth strategies for the
Global 1000, emerging businesses, the public sector and the investment
community. Is your organization prepared for the next profound wave of industry
convergence, disruptive technologies, increasing competitive intensity, Mega
Trends, breakthrough best practices, changing customer dynamics and emerging
economies?
www.frost.com

Más contenido relacionado

La actualidad más candente

2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPaloAltoNetworks
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 

La actualidad más candente (20)

2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 

Destacado

Strategi Menyonsong 5G di Indonesia
Strategi Menyonsong 5G di IndonesiaStrategi Menyonsong 5G di Indonesia
Strategi Menyonsong 5G di IndonesiaMastel Indonesia
 
Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)
Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)
Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)Mastel Indonesia
 
Connected Agricultural services and internet of things..
Connected Agricultural services and internet of things..Connected Agricultural services and internet of things..
Connected Agricultural services and internet of things..Atul Khiste
 
Preparing for the Next Broadband - MBS
Preparing for the Next Broadband - MBSPreparing for the Next Broadband - MBS
Preparing for the Next Broadband - MBSMastel Indonesia
 
Sejenak di 4G Melompati ke 5G
Sejenak di 4G Melompati ke 5GSejenak di 4G Melompati ke 5G
Sejenak di 4G Melompati ke 5GMastel Indonesia
 
Seoul | Jun-15 | Smart Villages Agenda & Concept
Seoul | Jun-15 | Smart Villages Agenda & ConceptSeoul | Jun-15 | Smart Villages Agenda & Concept
Seoul | Jun-15 | Smart Villages Agenda & ConceptSmart Villages
 
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...Andreas Kamilaris
 
5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah
5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah
5G Emergence and Regulatory Challenges - DG PPI - Prof. KalamullahMastel Indonesia
 
Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015
Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015
Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015Mastel Indonesia
 
Smart village model
Smart village modelSmart village model
Smart village modelachhajlani
 
Smart village through convergence ppt
Smart village through convergence pptSmart village through convergence ppt
Smart village through convergence pptDr. Ravindra Pastor
 
Hyderabad | Sep-16 | What is a Smart Village?
Hyderabad | Sep-16 | What is a  Smart Village?Hyderabad | Sep-16 | What is a  Smart Village?
Hyderabad | Sep-16 | What is a Smart Village?Smart Villages
 
Activating 5G Research in Indonesia
Activating 5G Research in IndonesiaActivating 5G Research in Indonesia
Activating 5G Research in IndonesiaMastel Indonesia
 
Smart class education
Smart class educationSmart class education
Smart class educationSaurav Misra
 

Destacado (20)

How to login
How to loginHow to login
How to login
 
5G Indonesia
5G Indonesia5G Indonesia
5G Indonesia
 
Strategi Menyonsong 5G di Indonesia
Strategi Menyonsong 5G di IndonesiaStrategi Menyonsong 5G di Indonesia
Strategi Menyonsong 5G di Indonesia
 
Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)
Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)
Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)
 
Connected Agricultural services and internet of things..
Connected Agricultural services and internet of things..Connected Agricultural services and internet of things..
Connected Agricultural services and internet of things..
 
Preparing for the Next Broadband - MBS
Preparing for the Next Broadband - MBSPreparing for the Next Broadband - MBS
Preparing for the Next Broadband - MBS
 
Sejenak di 4G Melompati ke 5G
Sejenak di 4G Melompati ke 5GSejenak di 4G Melompati ke 5G
Sejenak di 4G Melompati ke 5G
 
Tor pokja satelit mastel
Tor pokja satelit mastelTor pokja satelit mastel
Tor pokja satelit mastel
 
Seoul | Jun-15 | Smart Villages Agenda & Concept
Seoul | Jun-15 | Smart Villages Agenda & ConceptSeoul | Jun-15 | Smart Villages Agenda & Concept
Seoul | Jun-15 | Smart Villages Agenda & Concept
 
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...
 
5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah
5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah
5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah
 
RSVP Mastel.id
RSVP Mastel.idRSVP Mastel.id
RSVP Mastel.id
 
Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015
Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015
Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015
 
Smart Education in Korea
Smart Education in KoreaSmart Education in Korea
Smart Education in Korea
 
Smart village model
Smart village modelSmart village model
Smart village model
 
Smart village through convergence ppt
Smart village through convergence pptSmart village through convergence ppt
Smart village through convergence ppt
 
Hyderabad | Sep-16 | What is a Smart Village?
Hyderabad | Sep-16 | What is a  Smart Village?Hyderabad | Sep-16 | What is a  Smart Village?
Hyderabad | Sep-16 | What is a Smart Village?
 
Activating 5G Research in Indonesia
Activating 5G Research in IndonesiaActivating 5G Research in Indonesia
Activating 5G Research in Indonesia
 
ICT Outlook 2016
ICT Outlook 2016ICT Outlook 2016
ICT Outlook 2016
 
Smart class education
Smart class educationSmart class education
Smart class education
 

Similar a ASEAN Cyber Security Outlook

NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. JeniferAM Publications
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptxDolchandra
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Mehrdad Jingoism
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 

Similar a ASEAN Cyber Security Outlook (20)

NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 

Más de Mastel Indonesia

Challenges and Opportunities for ICT Industry in Indonesia 2016
Challenges and Opportunities for ICT Industry in Indonesia 2016Challenges and Opportunities for ICT Industry in Indonesia 2016
Challenges and Opportunities for ICT Industry in Indonesia 2016Mastel Indonesia
 
Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016Mastel Indonesia
 
Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016Mastel Indonesia
 
Masukan tentang Kedaulatan Siber NKRI kepada Menkominfo RI
Masukan tentang Kedaulatan Siber NKRI kepada Menkominfo RIMasukan tentang Kedaulatan Siber NKRI kepada Menkominfo RI
Masukan tentang Kedaulatan Siber NKRI kepada Menkominfo RIMastel Indonesia
 
Company Profile Indosat Ooredoo
Company Profile Indosat OoredooCompany Profile Indosat Ooredoo
Company Profile Indosat OoredooMastel Indonesia
 
Ovum ZTE Presentation Jakarta
Ovum ZTE Presentation Jakarta Ovum ZTE Presentation Jakarta
Ovum ZTE Presentation Jakarta Mastel Indonesia
 
Next Generation Mobile Broadband @ M-ICT Era
Next Generation Mobile Broadband @ M-ICT EraNext Generation Mobile Broadband @ M-ICT Era
Next Generation Mobile Broadband @ M-ICT EraMastel Indonesia
 
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG Gustiana5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG GustianaMastel Indonesia
 
Tor pokja menumbuhkembangkan ott nasional
Tor pokja menumbuhkembangkan ott nasionalTor pokja menumbuhkembangkan ott nasional
Tor pokja menumbuhkembangkan ott nasionalMastel Indonesia
 
Proposal pokja-unik-v1.5-rev-mas
Proposal pokja-unik-v1.5-rev-masProposal pokja-unik-v1.5-rev-mas
Proposal pokja-unik-v1.5-rev-masMastel Indonesia
 
Tor pokja industri aplikasi & konten
Tor pokja industri aplikasi & kontenTor pokja industri aplikasi & konten
Tor pokja industri aplikasi & kontenMastel Indonesia
 
Masukan pokja smart_citysmartvillage_mastel_juni_2015
Masukan pokja smart_citysmartvillage_mastel_juni_2015Masukan pokja smart_citysmartvillage_mastel_juni_2015
Masukan pokja smart_citysmartvillage_mastel_juni_2015Mastel Indonesia
 
Masukan pokja indonesia_services_co_mastel_juni_2015
Masukan pokja indonesia_services_co_mastel_juni_2015Masukan pokja indonesia_services_co_mastel_juni_2015
Masukan pokja indonesia_services_co_mastel_juni_2015Mastel Indonesia
 
Kick off pokja konvergensi
Kick off pokja konvergensiKick off pokja konvergensi
Kick off pokja konvergensiMastel Indonesia
 
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung (globally-networked)
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung  (globally-networked)Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung  (globally-networked)
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung (globally-networked)Mastel Indonesia
 

Más de Mastel Indonesia (17)

Challenges and Opportunities for ICT Industry in Indonesia 2016
Challenges and Opportunities for ICT Industry in Indonesia 2016Challenges and Opportunities for ICT Industry in Indonesia 2016
Challenges and Opportunities for ICT Industry in Indonesia 2016
 
Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016
 
Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016
 
Masukan tentang Kedaulatan Siber NKRI kepada Menkominfo RI
Masukan tentang Kedaulatan Siber NKRI kepada Menkominfo RIMasukan tentang Kedaulatan Siber NKRI kepada Menkominfo RI
Masukan tentang Kedaulatan Siber NKRI kepada Menkominfo RI
 
Company Profile Indosat Ooredoo
Company Profile Indosat OoredooCompany Profile Indosat Ooredoo
Company Profile Indosat Ooredoo
 
Ovum ZTE Presentation Jakarta
Ovum ZTE Presentation Jakarta Ovum ZTE Presentation Jakarta
Ovum ZTE Presentation Jakarta
 
Next Generation Mobile Broadband @ M-ICT Era
Next Generation Mobile Broadband @ M-ICT EraNext Generation Mobile Broadband @ M-ICT Era
Next Generation Mobile Broadband @ M-ICT Era
 
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG Gustiana5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
 
Hate speech
Hate speechHate speech
Hate speech
 
Tor pokja menumbuhkembangkan ott nasional
Tor pokja menumbuhkembangkan ott nasionalTor pokja menumbuhkembangkan ott nasional
Tor pokja menumbuhkembangkan ott nasional
 
Proposal pokja-unik-v1.5-rev-mas
Proposal pokja-unik-v1.5-rev-masProposal pokja-unik-v1.5-rev-mas
Proposal pokja-unik-v1.5-rev-mas
 
Tor pokja industri aplikasi & konten
Tor pokja industri aplikasi & kontenTor pokja industri aplikasi & konten
Tor pokja industri aplikasi & konten
 
Pokja roadmap industri
Pokja roadmap industriPokja roadmap industri
Pokja roadmap industri
 
Masukan pokja smart_citysmartvillage_mastel_juni_2015
Masukan pokja smart_citysmartvillage_mastel_juni_2015Masukan pokja smart_citysmartvillage_mastel_juni_2015
Masukan pokja smart_citysmartvillage_mastel_juni_2015
 
Masukan pokja indonesia_services_co_mastel_juni_2015
Masukan pokja indonesia_services_co_mastel_juni_2015Masukan pokja indonesia_services_co_mastel_juni_2015
Masukan pokja indonesia_services_co_mastel_juni_2015
 
Kick off pokja konvergensi
Kick off pokja konvergensiKick off pokja konvergensi
Kick off pokja konvergensi
 
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung (globally-networked)
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung  (globally-networked)Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung  (globally-networked)
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung (globally-networked)
 

Último

Scootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City DeliveryScootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City Deliveryrishi338139
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Sebastiano Panichella
 
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08LloydHelferty
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptxerickamwana1
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitysandeepnani2260
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxRoquia Salam
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityApp Ethena
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per MVidyaAdsule1
 
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...soumyapottola
 

Último (11)

Scootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City DeliveryScootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City Delivery
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
 
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber security
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptx
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per M
 
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
 

ASEAN Cyber Security Outlook

  • 1. Outlook Briefing 2016: Cyber Security Charles Lim Senior Industry Analyst, Cyber Security - Digital Transformation Practice Frost & Sullivan Asia Pacific Charles.Lim@frost.com
  • 2. 2 What happens in an Internet minute?
  • 3. Proliferation of Cyber Attacks in 2015 targeted popular services Data is the new gold, inability to secure them leads to distrust in services 3 Uber accounts have been hacked and are being used to secure rides in China without their consent or knowledge Apple had to remove more than 300 apps from its app store infected by xCodeGhost malware, affecting 500 million users In the week of Black Friday, Amazon has reportedly begun forcibly resetting some users’ passwords over concerns about a major breach. 54% of security professionals view social engineering attacks through phishing emails as the top threat technique that they have encountered Over one thousand email addresses and passwords from Spotify were possibly leaked LinkedIn encountered a major breach of its password database - a file containing passwords using “linkedin” appeared in an online forum A security researcher discovered a way to perform remote code execution and retrieve confidential data from Instagram and Facebook Twitter emailed more than 20 users, warning them they may have been targeted by hackers ‘possibly associated with a government’ A Vine star who makes £2,000 per second from his posts claims he has been hacked, with all of his videos deleted from his account Google Malaysia’s site was hacked; visitors were re-directed to a hacker’s webpage Hackers claiming to be working on behalf of ISIS took over the Twitter and YouTube accounts of the United States Central Command All of these attacks occurred in 2015 Compromised Skype users reported that malicious links and messages were sent to their contact list
  • 4. Cyber attacks – fueling the international crime scene, online 100MMore than 100 million health care records compromised in 2015. Medical records are worth 10 times more than credit card information in the dark web.
  • 5. Cyber attacks – the channel for making a statement 602GbpsOn 31st Dec 2015, BBC received a 602Gbps Distributed Denial of Service (DDoS) attack, the highest ever recorded in history. New World Hacking, who claimed responsibility announced that it was a test of their power. Their main target are ISIS websites. 25GB LEAKEDThe Impact Team stole more than 25GB user data from adultery website, Ashley Madison and released the information on 18th August 2015. The original intention was to force Avid Life Media to shut down the website, and stop online adultery.
  • 6. “Indonesia experiences around 50,000 cyber attacks every day. That makes it the second-most targeted country for cyber attack after Vietnam.” - Yono Reksoprodj, advisor to Minister for Political, Legal and Security Affairs Tedjo Edhy Purdijatno Speaking on Indonesia’s National Cyber Agency 8th Jun 2015 >50,000 ATTACKS
  • 7. “We don’t believe any cyberdefense is fail proof. But a strong, well thought out strategy, coupled with a rapid ability for a bank to understand when its systems have been maliciously penetrated and swiftly take the necessary actions, such as isolating the attack, is key to a successful cybersecurity strategy.” - Stuart Plesser, Standard & Poor’s Press statement pertaining to possible downgrade of banks’ ratings, if it is believed to be ill-prepared to withstand cyber attacks. 7
  • 8. The need to focus on Industrial Control Systems Security as priority 8 Security Challenges within Internet of Things Source: Frost & Sullivan Connected cars has been proven to be hacked in recent times, however the actual impact is to the driver’s safety and are at a very nascent stage of security that is acted now by automobile manufacturers. Connected homes, which are developed with the use of smart consumer appliances such as wireless fridges, lighting, and thermostats have limited impacts and are not desirable targets. Industrial Control Systems, which automates most critical infrastructures are now going through an active transformation to connect to the Internet, and have been victims of attacks, extortion where any successful attack will cause a severe impact to citizens nationwide.
  • 9. Cyber Attacks Shift Towards Physical Systems Industrial Control Systems in operational technology creating new points of vulnerabilities 9 97% 3% Number of Internet-connected ICS devices, August 2015, Asia Pacific Connected Devices Vulnerable Devices Source: Asia-Pacific Industrial Control Systems Security Report, Frost & Sullivan N=3087 BLACKOUTto thousands of homes in Western Ukraine, using the BlackEnergy malware to attack electric substations. it was reportedly developed by Moscow-backed group, Sandworm on 23rd Dec 2015. Subsequently, its Kiev Airport was attacked by the same malware during Jan 2016. Investigations are ongoing.
  • 10. Case analysis – Industrial Control Systems Security The need to protect SCADA (Supervisory Control and Data Acquisition) systems beyond the “air gap” concept has been elevated since the 2011 Stuxnet APT attack. Critical infrastructures using ICS systems and needs to raise the awareness and knowhow of how to protect these systems as a priority when these systems get connected to the Internet. Present: “Air Gap” Future: The Internet Human Machine Interface (HMI) SCADA, PLCS Speed: 500 r/min Business networks, connected to the Internet Industrial networks that runs on local area networks separated from the Internet, however still vulnerable to attacks Stuxnet malware installed in USB drive External contractors’ laptop Information Technology Operational Technology Graphic source: Vector Open Stock 10Source: Frost & Sullivan
  • 11. Operationalizing the 3C’s for Cyber Security Cyber Resilience Risks & Business Impacts Cyber Intelligence Knowledge and correlation of all threats in the organization Cyber Protection Building the right prevention base “Security by Design” 11Source: Frost & Sullivan
  • 12. Threat Response Adaptive Core Ecosystem (TRACE): Identifying the essentials Frost & Sullivan believes that adopting a platform approach can operationalize the vision of a holistic security strategy, comprising the right balance between security mindsets, tools and skill sets. Access Management Endpoints Web Assets Cloud App Security Content Integrated Security Appliances Advanced Threat Prevention Human Factor Mitigation Vulnerability Management Security Analytics T R A C E 12 Source: Frost & Sullivan
  • 13. Projected growth of security solutions in ASEAN, CY2015 (CAGR=20.8%) Managed Security Services Market Forecast Analysis - 5.0 10.0 15.0 20.0 25.0 30.0 0.0 100.0 200.0 300.0 400.0 500.0 600.0 2014 2015 2016 2017 2018 2019 2020 Revenue($Million) GrowthRate(%) Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
  • 14. Projected growth of security solutions in Indonesia, CY2015 (CAGR=27.1%) Managed Security Services Market Forecast Analysis - 5.0 10.0 15.0 20.0 25.0 30.0 35.0 40.0 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 2014 2015 2016 2017 2018 2019 2020 Revenue($Million) GrowthRate(%) Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
  • 15. Network security adoption in Southeast Asia 0.0 20.0 40.0 60.0 80.0 100.0 120.0 Rest of ASEAN Philippines Vietnam Thailand Indonesia Malaysia Singapore CY2015 Q3 YTD CY2014 Total Network Security Tracker, 2015 QTD Market Size (US$, M) Indonesia achieved one of the highest growth rates at 30% YoY (Q3 QTD) Indonesia Network Security, Indonesia (US$, M) 2014 Q3 QTD 2015 Q3 QTD
  • 16. N = 13,930 qualified information security professionals globally. 10% of respondents are Asia Pacific 44% 49% 52% 72% 75% Automated identity management software Web security applications Policy management and audit tools Improved intrusion detection and prevention technologies Network monitoring and intelligence Top 5 Technologies that Significantly Improve Security (Percent of Survey Respondents) 18% 23% 35% Use of Advanced Analytics for Detection of Advanced Malware (Percent of Survey Respondents) No Plans Evaluating or Selecting a Solution(s) Implemented or Implementing 2015 (ISC)2 Global information Security Workforce Study by Frost & Sullivan
  • 17. 17 “How do you really handle all these… big data?” - VP for Security Infrastructure, leading telco provider, Indonesia “We have figured out using using our own designed algorithms across collected logs, to decipher insider threats” - Chief Security Officer, leading technology vendor Opinions from the ground
  • 18. Observation of trends in Security Analytics market Observations in the security analytics players in APAC Sold off their IPS offerings, may focus in other enterprise security products such as SIEM tools Integration with endpoint security, correlation of packets and logs Launch of X-force exchange, integration of product and services business units
  • 19. Observation of trends in Security Analytics market Observations in the security analytics / threat intelligence players in APAC Focus on forensics and incident response capabilities User behavior analytics using machine learning systems and algorithms to identify fraud Correlation of business and security intelligence. Position to block against APT attacks
  • 20. Empowering the cyber defenses in Indonesia Frost & Sullivan’s End User Research and Advisory Practice Circular, 4G LTE Vulnerability Research papers – Frost Industry Quotient (FIQ) and Market insights Threat Intelligence AlertsCyber Security Threats and Solutions Briefings
  • 21. Cyber Security Outlook for 2016 Building the required capabilities for Cyber Resiliency 21 Improve Cyber Defense in Critical Infrastructures 1 Human expertise and foster collaboration 2 • Increase of Cyber Security Operation Centers in the Critical infrastructures. • Compliance guidelines to ensure cyber resiliency in both business (IT) and operations (OT) 3 How companies are respondingHow companies are responding • Cyber security training • Sharing of intelligence amongst industries • Setting up cyber security committees Build a holistic defense beyond the organization • Vendors/contractors to meet security standards in the process of mitigating chain- of-trust attacks.
  • 22. Cyber Security Outlook for 2016 Building the required capabilities for Cyber Resiliency 22 Investments into analytics to improve accuracy and speed 4 5 • Big data analytics for multiple sources of threat feeds will become the common concern and more accurate judgment through automated algorithms will be needed. 6 How companies are respondingHow companies are responding • Enterprises will switch from ‘adopting cyber security for their cloud setup’ to ‘adopting cloud as part of their cyber security strategy’. Convergence security concepts to be introduced • Convergence of threats & detection of fraud between physical and cyber systems • Developments of convergence security in smart cities. Adopting cloud security as a strategy
  • 23. Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today’s market participants. For more than 50 years, we have been developing growth strategies for the Global 1000, emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies? www.frost.com