SlideShare a Scribd company logo
1 of 14
The Bad Guys
are Winning
Wade Baker, principal author of the Data Breach
Investigations Report (DBIR) series, says is that:
“After analyzing 10 years of data, we realize most
organizations cannot keep up with cybercrime – and
the bad guys are winning.”
"Attackers are getting quicker at compromising
systems over the past 10 years,"
"Less than 25 percent of good guys discovered these
incidents in days or less. This is not a good situation ...
The bad guys are winning at a faster rate than the good
guys are winning."
The Bad Guys
are Attacking
Your Data
Ram scraper [mal] 223
"RAM scrapers" went from a low #17 in 2012 and shoot
up the charts to a very concerning #4 spot in 2013.
Verizon’s 2014 Data Breach Investigations Report
Export data [mal] 327
“Export data" went from a low #7 in 2012 and shoot up
the charts to a very concerning #2 spot in 2013.
Verizon’s 2014 Data Breach Investigations Report
Capture stored data [mal] 133
“Stored data" went from a #4 in 2012 and to a less concerning
#9 spot in 2013
Verizon’s 2014 Data Breach Investigations Report
Privillege abuse [mis] 65
"Privilege abuse" went from a #14 in 2012 and to a less
concerning #17 spot in 2013
Verizon’s 2014 Data Breach Investigations Report
Capture stored data [mal] 133
My Conclusion: File Encryption is Not Helping
Verizon’s 2014 Data Breach Investigations Report
File encryption
Privillege abuse [mis] 65
My Conclusion: Database Monitoring will Not Help
Verizon’s 2014 Data Breach Investigations Report
Database Activity
Monitoring
Ram scraper [mal] 223
Export data [mal] 327
My Conclusion: Secure The Sensitive Data Flow
Verizon’s 2014 Data Breach Investigations Report
Data Tokenization
Data Tokenization
Attacking
Emerging
Platforms
Cloud and Big Data
Emerging Big Data and Cloud platforms are presenting new use cases that are requiring data
insight for analytics, high performance and scalability for Big Data platforms cannot be achieved
by old security approaches.
An important development was the addition of coarse-grained volume or file encryption will
only solve one problem, protecting data at rest, but considering one of the primary goals is
using the data, one might suggest that it provided little in the grand scheme of Data security.
Sensitive data in use for analytics, traveling between nodes, sent to other systems, or even just
being viewed is subject to full exposure.
What they’re seeking is advanced functionality equal to the task of balancing security and
regulatory compliance with data insights and data utility.
This balance is critical for Big Data and Cloud platforms.
Big Data
Big Data is introducing a new approach to collecting data by allowing unstructured data to be
blindly collected. In many cases we do not even know about all sensitive and regulated data
fields that are contained in these large data feeds.
Analysis of the content is often deferred to a later point in the process, to a stage when we are
starting to use the data for analytics.
New security approaches are required since Big Data is based on a new and different
architecture.
Then it is too late to go back and try to apply data security and compliance to regulations.
Conclusion
My view is that that we are now more concerned about attackers that are targeting
our data flow.
My view is that that we are now less concerned about attackers that are targeting our
stored data.
I think that file encryption will not stop the bad guys.
I found some good news in an interesting report from the Aberdeen Group that
revealed that "Over 12 months, data tokenization users had 50% fewer security-
related incidents (e.g., unauthorized access, data loss or data exposure than
tokenization non-users".
Nearly half of the respondents (47%) are currently using tokenization for something
other than cardholder data.
The name of the study is "Tokenization Gets Traction".

More Related Content

More from Ulf Mattsson

Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
Ulf Mattsson
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
Ulf Mattsson
 

More from Ulf Mattsson (20)

Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 

Recently uploaded

Recently uploaded (20)

Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

Verizon 2014 data breach investigations report dbir - my view ext

  • 2. Wade Baker, principal author of the Data Breach Investigations Report (DBIR) series, says is that: “After analyzing 10 years of data, we realize most organizations cannot keep up with cybercrime – and the bad guys are winning.” "Attackers are getting quicker at compromising systems over the past 10 years," "Less than 25 percent of good guys discovered these incidents in days or less. This is not a good situation ... The bad guys are winning at a faster rate than the good guys are winning."
  • 3. The Bad Guys are Attacking Your Data
  • 4. Ram scraper [mal] 223 "RAM scrapers" went from a low #17 in 2012 and shoot up the charts to a very concerning #4 spot in 2013. Verizon’s 2014 Data Breach Investigations Report
  • 5. Export data [mal] 327 “Export data" went from a low #7 in 2012 and shoot up the charts to a very concerning #2 spot in 2013. Verizon’s 2014 Data Breach Investigations Report
  • 6. Capture stored data [mal] 133 “Stored data" went from a #4 in 2012 and to a less concerning #9 spot in 2013 Verizon’s 2014 Data Breach Investigations Report
  • 7. Privillege abuse [mis] 65 "Privilege abuse" went from a #14 in 2012 and to a less concerning #17 spot in 2013 Verizon’s 2014 Data Breach Investigations Report
  • 8. Capture stored data [mal] 133 My Conclusion: File Encryption is Not Helping Verizon’s 2014 Data Breach Investigations Report File encryption
  • 9. Privillege abuse [mis] 65 My Conclusion: Database Monitoring will Not Help Verizon’s 2014 Data Breach Investigations Report Database Activity Monitoring
  • 10. Ram scraper [mal] 223 Export data [mal] 327 My Conclusion: Secure The Sensitive Data Flow Verizon’s 2014 Data Breach Investigations Report Data Tokenization Data Tokenization
  • 12. Cloud and Big Data Emerging Big Data and Cloud platforms are presenting new use cases that are requiring data insight for analytics, high performance and scalability for Big Data platforms cannot be achieved by old security approaches. An important development was the addition of coarse-grained volume or file encryption will only solve one problem, protecting data at rest, but considering one of the primary goals is using the data, one might suggest that it provided little in the grand scheme of Data security. Sensitive data in use for analytics, traveling between nodes, sent to other systems, or even just being viewed is subject to full exposure. What they’re seeking is advanced functionality equal to the task of balancing security and regulatory compliance with data insights and data utility. This balance is critical for Big Data and Cloud platforms.
  • 13. Big Data Big Data is introducing a new approach to collecting data by allowing unstructured data to be blindly collected. In many cases we do not even know about all sensitive and regulated data fields that are contained in these large data feeds. Analysis of the content is often deferred to a later point in the process, to a stage when we are starting to use the data for analytics. New security approaches are required since Big Data is based on a new and different architecture. Then it is too late to go back and try to apply data security and compliance to regulations.
  • 14. Conclusion My view is that that we are now more concerned about attackers that are targeting our data flow. My view is that that we are now less concerned about attackers that are targeting our stored data. I think that file encryption will not stop the bad guys. I found some good news in an interesting report from the Aberdeen Group that revealed that "Over 12 months, data tokenization users had 50% fewer security- related incidents (e.g., unauthorized access, data loss or data exposure than tokenization non-users". Nearly half of the respondents (47%) are currently using tokenization for something other than cardholder data. The name of the study is "Tokenization Gets Traction".