what’s in store? cyber threats in 2016 and beyond
TRANSCRIPT
.
.
McAfee Labs
What’s in store? Cyber threats in 2016 and beyond January 20, 2016
.
2
Agenda
McAfee LabsWhat’s in store? Cyber threats in 2016 and beyond
Panelist introductions
2016 predictions overview
Top 2016 predictions
• Hardware – Matthew Rosenquist
• Ransomware – Christiaan Beek
• Wearables – Bruce Snell
• Automobiles – Matthew Rosenquist
• Critical infrastructure – Raj Samani
• Sharing threat intelligence – Jeannette Jarvis
Looking beyond 2016
Q&A
Wrap up
.
3
Panelists
Raj Samani (moderator)CTO for Europe, Middle East, and AfricaIntel Security
Christiaan BeekDirector of Threat IntelligenceIntel Security
Bruce SnellSecurity and Privacy DirectorIntel Security
Matthew RosenquistCybersecurity Strategist and Evangelist Intel
Jeannette JarvisDirector Product ManagementIntel Security
.
4
McAfee Labs 2016 Threats PredictionsHardware
Ransomware
Vulnerabilities
Payment systems
Attacks through employee systems
Cloud services
Wearables
Intel Security: A Five-Year Look Ahead
www.mcafee.com/2016threatspredictions
Automobiles
Warehouses of stolen data
Integrity
Cyber espionage
Hacktivism
Critical infrastructure
Sharing threat intelligence
.
2016 Threats Predictions
.
Attacks on all types of hardware and firmware will continue. The market for hardware attack tools will expand. VMs will be successfully attacked through system firmware rootkits.
Hardware
Equation Group – HDD and SSD firmware reprogramming malware
First commercial UEFI Rootkit
.
Ransomware will remain a major and rapidly growing threat in 2016, fueled by anonymizing networks and payment methods.
Inexperienced cybercriminals will leverage ransomware-as-a-service, magnifying the growth in ransomware.
Ransomware
.
Wearables will be a prime target for cyber criminals because they collect personal data and they are relatively insecure back doors into smartphones.
Wearables
Wearables Attack Surfaces
.
Attacks on automobiles will increase rapidly in 2016 due to the rapid increase in connected automobile hardware built without foundational security principles.
Automobiles
Automobile Attack Surfaces
.
Critical infrastructure systems not designed with outside access in mind will become vulnerable to low-incident, but high-impact events as they become connected to the Internet.
Critical infrastructure
.
Threat intelligence sharing among enterprises and security vendors will grow rapidly.
Sharing threat intelligence
Legislative steps will make it possible to share threat intelligence with government.
We will see an acceleration in the development of best practices for sharing emerging threat information.
Threat intelligence cooperatives between industry vendors will expand. STIX/TAXII will be the standard by which they share information.
Metrics for success will emerge, allowing enterprises, security vendors, and governments to quantify protection improvement.
.
Looking Beyond 2016
.
13
Q&A
McAfee Labs 2016 Threats PredictionsHardware
Ransomware
Vulnerabilities
Payment systems
Attacks through employee systems
Cloud services
Wearables
www.mcafee.com/2016threatspredictions
Automobiles
Warehouses of stolen data
Integrity
Cyber espionage
Hacktivism
Critical infrastructure
Sharing threat intelligence
McAfee Labs @McAfee_LabsRaj Samani @Raj_SamaniChristiaan Beek @ChristiaanBeekMatthew Rosenquist @Matt_RosenquistJeannette Jarvis @jarvisjBruce Snell @brucesnell
Continue the conversation! Tweet to #cybersec
.