Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security for Today’s Threat Landscape Kat Pelak 1.

Similar presentations


Presentation on theme: "Security for Today’s Threat Landscape Kat Pelak 1."— Presentation transcript:

1 Security for Today’s Threat Landscape Kat Pelak 1

2

3 Mega Breaches Healthcare, education and the public sectors accounted for 58% of all data breaches But the retail, computer software and financial sectors accounted for 77% of all the identities exposed in Healthcare, education and the public sectors accounted for 58% of all data breaches But the retail, computer software and financial sectors accounted for 77% of all the identities exposed in

4 Top Causes of Data Breaches 4 Sept to Aug 2014 Source: Symantec Hackers Accidentally Made Public Theft or Loss Insider Theft 53% 21% 20% 6% TOTAL Number of Incidents

5 Data Loss Increase ? ? 552M Total identities exposed in 2013, A 493% Increase M 552M

6 Breaches

7 Data by the Numbers

8 Ransomware 500% in the last 6 months.

9 Dragonfly: Western Energy Companies Under Sabotage Threat Ongoing cyberespionage campaign Targeting the energy sector in Europe and US. Other sectors not immune Stealing information Capable of sabotage Attacker capabilities –persistent access to networks –Information stealing –Sabotage Ongoing cyberespionage campaign Targeting the energy sector in Europe and US. Other sectors not immune Stealing information Capable of sabotage Attacker capabilities –persistent access to networks –Information stealing –Sabotage

10 10 A Russian crime organization has reportedly stolen over 1.2 billion Internet credentials. Over 4,000 websites appear to have been compromised Why is Security so LAX?

11 -borne threats are common 11 1 in 392 s are a phishing attack 1 in 196 s are a malware attack 66% of all is spam 25% Contain a hyperlink to malicious code

12 Mobile Users at Risk 50 % 38 % Source: 2013 Norton Report Don’t use basic precautions such as passwords, security software or back up files for their mobile device Of smartphone users have experienced mobile cybercrime in past 12 months

13 72 % 90 % 78 % 56 % 48 % 33 % DELETE SUSPICIOUS S FROM PEOPLE THEY DON’T KNOW HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE Mobile Security IQ Source: 2013 Norton Report

14 Social Media

15 Mobile Threats Android remains the platform of choice for malware authors Android Symbian Windows Number of Threats Percent of Threats 94% 2% 1 Platform iOS Mobile Threats: Malicious Code by Platform, 2013 Source: Symantec

16 Targeted Attacks

17 Protection Against Targeted Attacks Reputational & BehavioralProtection (SEP) Detect and block new and unknown threats based on global reputation and behavior of files Host-based IntrusionDetection and Prevention (DCS) Locks down key systems that contain confidential information Prevents any unauthorized code to run — independent of AV signatures Removable Media Device Control(SEP) Restrict removable devices and functions to prevent malware infection & Web Gateway Security Scan & block with potentially malicious URLs, attachments or content. Monitor inbound/outbound web traffic and block accordingly Encryption Discover data spills of confidential information that are targeted by attackers Detect and prevent exfiltration of confidential information that are targeted by attackers Endpoint & Network DataCorrelation (MSS-ATP) Create and enforce security policies so all confidential information is encrypted Network Threat and VulnerabilityMonitoring (MSS) Prioritize threat information detected at the network through security intelligence and information coming from endpoint security devices.

18 Zero-day Vulnerabilities

19 Avoiding Data Breaches 19 Data Classification (Insight) Determine what sensitive information exists in your organization Categorize it appropriately and protect it according to its classification level Data Loss Prevention (DLP) Detect and prevent exfiltration of sensitive information that is targeted by attackers Enforce rules prohibiting access of confidential data using applications Host-based IntrusionDetection and Prevention (DCS) Locks down key systems that contain confidential information Prevents any unauthorized code to run — independent of AV signatures & Web Gateway Security Scan & block with potentially malicious URLs, attachments or content. Monitor inbound/outbound web traffic and block accordingly Encryption Create and enforce security policy so all confidential information is encrypted Strong Authentication (VIP) Use two-factor authentication to protect against credential theft

20 Mitigating Mobile Attacks 20 Application ManagementSymantec App Center Secure data in corporate applications regardless of device ownership Device ManagementSymantec Mobile Management Remotely wipe devices in case of theft or loss, control password policies Update devices with applications as needed without physical access Device SecuritySymantec App Center Guard mobile device against malware Prevent the device from becoming a vulnerability Identity & Access ControlSymantec VIP Provide strong authentication and authorization for access to enterprise applications and resources Ensure safe access to enterprise resources from right devices with right postures

21 Defense-in-Depth Security Information Management Secure Mail Gateway Client and Asset Management Encryption Endpoint Protection

22 3 things you should do when you leave this room.. Review your current security stack Presentation Identifier Goes Here Consider your options to fill the gaps If you need help, contact Symantec

23 23 Download: symantec.com/threatreport Stay Informed

24 Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Download ppt "Security for Today’s Threat Landscape Kat Pelak 1."

Similar presentations


Ads by Google