global threat landscape

13
Global Threat Landscape Presentation by Jynette Reed 09 th February 2015

Upload: jynette-reed

Post on 17-Jan-2017

88 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Global threat landscape

Global Threat Landscape

Presentation by Jynette Reed09th February 2015

Page 2: Global threat landscape

Agenda

•Threat Landscape•What is an APT•2014 as we know it•Facts•Defining Moments•Why Care•Security Strategies•Mandiant

Page 3: Global threat landscape

Introduction to the Global Threat1. Thousands of IT Systems are compromised every day

2. Attacks can be political but most commonly are to steal money or secrets

3. The magnitude of the attacks pose a real threat to Britain's economic state

4. No such thing as 100% Protection

Page 4: Global threat landscape

Definition - What is an APT

An advanced persistent threat is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.

The purpose of an APT attack is to steal data rather than to cause damage.

What distinguishes an APT from other threats is it is targeted, persistent, evasive and advanced

Page 5: Global threat landscape

2014 – IF ONLY WE KNEW

Security breaches are inevitable

Headliners

•Sony•JP Morgan•PSN – DDOS•Home Depot

Page 6: Global threat landscape

Statistics

Headliners

•Sony•JP Morgan•PSN – DDOS•Home Depot

Page 7: Global threat landscape

Why should you care?

•Data Destroyed, Stolen, Exposed

•Present and former employees personally impacted

•Lawsuits

•Brand Damage

•REPUTATION

•Decrease in share prices

Page 8: Global threat landscape

Q. A Disaster puts you at risk and you’re off limits for 3 days. Are you?

A, Well Prepared

B, Somewhat Prepared

C, Not clear

D, In Deep Trouble

Page 9: Global threat landscape

Security Strategies:•To attack the security gap, organizations need smart people, visibility into their networks, endpoints and logs.

•Organisations also need actionable threat intelligence that identifies malicious activity faster.

•Protecting your computer with a standalone anti-virus solution only is simply no longer enough to protect your devices and your sensitive information.

•A comprehensive, 360-degree security solution is entry level protection

Breaches are inevitable — how will you cope

Page 10: Global threat landscape

Mandiant a helping hand• Mandiant is the ONLY information security company that can show:

• WHEN • IMPACT

• More than 30% of the Fortune 100 have turned to us when they’ve been under assault

• We Complement Your Capabilities With Ours

There Is Strength In Fingerprints

• We Have Undisputed Experts

Page 11: Global threat landscape

Why Mandiant

Because hunting down APT’s is not as easy as this!

Page 12: Global threat landscape

The Year Ahead• In 2015 the public and press will be on high alert

Re: privacy and security

• Malicious messages that look like the real thing

• Ransomware moves into the cloud and onto your phone

• Point-of-sale attacks

• Targeting the 'one percent‘

Page 13: Global threat landscape

Conclusion

You will be breached, it may not be now and it may not be big but it will happen!!.

Are you ready for it?

Any questions?