‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, 2012 1 Industry and the fight against cybercrime.

Slides:



Advertisements
Similar presentations
© 2008 Oracle Corporation – Proprietary and Confidential.
Advertisements

Chapter 15 Legal & Ethical Issues
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
ITU Regional Workshop on Bridging the Standardization Gap Information and Network Security Presentation by Philip Victor & Shahbaz Khan Nadi, Fiji 4 th.
0 - 0.
FACTORING Think Distributive property backwards Work down, Show all steps ax + ay = a(x + y)
Addition Facts
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
© S Haughton more than 3?
Services Course Windows Live SkyDrive Participant Guide.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Addition 1’s to 20.
25 seconds left…...
IT Analytics for Symantec Endpoint Protection
Week 1.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Online Shopping Self-Defense
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Ilias Chantzos Senior Director, Government Affairs - EMEA Symantec Cyber-security & cyber-resilience: Policy implications in smart cities.
Security for Today’s Threat Landscape Kat Pelak 1.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Lloyds 360 Risk Insight Dec 2010 Malcolm Harkins Malcolm Harkins Chief Information and Security Officer General Manager Intel Information Risk and Security.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
1 Cybersecurity and web-based attacks A perspective from Symantec Zoltan Precsenyi Government Affairs Manager International Conference on Terrorism and.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Adversary Defense: Past, Present, Future Presenter’s Name Here Presenter’s Title Here.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Cyberdefense and security policy – concepts and considerations for government policy 1 Cyberdefense and security policy Concepts and considerations for.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
“Introduction to Azure Security Center”
Journey to Microsoft Secure Cloud
The utility belt for managing security and compliance in Office 365
Cybersecurity Strategy
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Presentation transcript:

‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime What we can do… and what we can’t Zoltán Précsényi Government affairs manager

Sample Agenda Cyber-threat challenges today – Budapest, September 17-18, About Symantec 1 The threat landscape in a nutshell 2 What we can do 3 What we can’t 4 Conclusion 5

About Symantec Cyber-threat challenges today – Budapest, September 17-18,

Symantec’s Global Intelligence Network Identifies more threats + takes action faster + prevents impact Information Protection Preemptive Security Alerts Threat Triggered Actions Global Scope and Scale Worldwide Coverage 24x7 Event Logging Rapid Detection Threat Activity 240,000+ sensors 200+ countries Malware Intelligence 180M client, server, gateways Global coverage Vulnerabilities 35,000+ vulnerabilities 11,000 vendors 80,000+ technologies Spam/Phishing 5M decoy accounts 8B+ messages/daily 1.5B+ web requests/daily Cyber-threat challenges today – Budapest, September 17-18, 2012

5 The threat landscape in a nutshell Latest trends

Cyberthreats are steadily on the rise Cyber-threat challenges today – Budapest, September 17-18, Source: Symantec Internet Security Threat Report vol. 17, May 2012

Cybercriminals are relentless Cyber-threat challenges today – Budapest, September 17-18, Source: Norton Cybercrime Report, September 2012

Cyber-threat challenges today – Budapest, September 17-18, Fighting cybercrime: What we can do

We can educate and build awareness Cyber-threat challenges today – Budapest, September 17-18,

Control Compliance Identity & Authentication Data Loss Prevention & Encryption In Depth Security IT Management Global Intelligence Network Integrated Protection Managed services and cloud 3 rd Party Technology Partners We can provide technology and training Cyber-threat challenges today – Budapest, September 17-18, 2012

We can assist with expertise and information Cyber-threat challenges today – Budapest, September 17-18,

Cyber-threat challenges today – Budapest, September 17-18, Fighting cybercrime: What we can’t do

We won’t go beyond what’s legal Cyber-threat challenges today – Budapest, September 17-18,

We won’t be liable for behaviours we don’t control Cyber-threat challenges today – Budapest, September 17-18,

We won’t make unsubstantiated claims Cyber-threat challenges today – Budapest, September 17-18, WHO? WHERE FROM? WHY?

We won’t be law enforcement Cyber-threat challenges today – Budapest, September 17-18, WeLaw enforcement Detect security incidents Finds out whether it’s cybercrime Analyse traffic data, examine software code Investigates forensic evidence, prosecutes suspects Respond technically as and where appropriate Enforces the law, imposes sanctions

We won’t be law enforcement Cyber-threat challenges today – Budapest, September 17-18, WeLaw enforcement Detect security incidents Finds out whether it’s cybercrime Analyse traffic data, examine software code Investigates forensic evidence, prosecutes suspects Respond technically as and where appropriate Enforces the law, imposes sanctions

Cyber-threat challenges today – Budapest, September 17-18, Conclusion

Public-Private Partnership is key to fighting cybercrime Cyber-threat challenges today – Budapest, September 17-18, Powers Competence Privileged info Jurisdiction Technical capabilities Expertise Intelligence Global reach

Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! Cyber-threat challenges today – Budapest, September 17-18, Zoltán Précsényi