what’s in store? cyber threats in 2016 and beyond

14
. . McAfee Labs What’s in store? Cyber threats in 2016 and beyond January 20, 2016

Upload: intel-security

Post on 08-Jan-2017

4.382 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: What’s in store? Cyber threats in 2016 and beyond

.

.

McAfee Labs

What’s in store? Cyber threats in 2016 and beyond January 20, 2016

Page 2: What’s in store? Cyber threats in 2016 and beyond

.

2

Agenda

McAfee LabsWhat’s in store? Cyber threats in 2016 and beyond

Panelist introductions

2016 predictions overview

Top 2016 predictions

• Hardware – Matthew Rosenquist

• Ransomware – Christiaan Beek

• Wearables – Bruce Snell

• Automobiles – Matthew Rosenquist

• Critical infrastructure – Raj Samani

• Sharing threat intelligence – Jeannette Jarvis

Looking beyond 2016

Q&A

Wrap up

Page 3: What’s in store? Cyber threats in 2016 and beyond

.

3

Panelists

Raj Samani (moderator)CTO for Europe, Middle East, and AfricaIntel Security

Christiaan BeekDirector of Threat IntelligenceIntel Security

Bruce SnellSecurity and Privacy DirectorIntel Security

Matthew RosenquistCybersecurity Strategist and Evangelist Intel

Jeannette JarvisDirector Product ManagementIntel Security

Page 4: What’s in store? Cyber threats in 2016 and beyond

.

4

McAfee Labs 2016 Threats PredictionsHardware

Ransomware

Vulnerabilities

Payment systems

Attacks through employee systems

Cloud services

Wearables

Intel Security: A Five-Year Look Ahead

www.mcafee.com/2016threatspredictions

Automobiles

Warehouses of stolen data

Integrity

Cyber espionage

Hacktivism

Critical infrastructure

Sharing threat intelligence

Page 5: What’s in store? Cyber threats in 2016 and beyond

.

2016 Threats Predictions

Page 6: What’s in store? Cyber threats in 2016 and beyond

.

Attacks on all types of hardware and firmware will continue. The market for hardware attack tools will expand. VMs will be successfully attacked through system firmware rootkits.

Hardware

Equation Group – HDD and SSD firmware reprogramming malware

First commercial UEFI Rootkit

Page 7: What’s in store? Cyber threats in 2016 and beyond

.

Ransomware will remain a major and rapidly growing threat in 2016, fueled by anonymizing networks and payment methods.

Inexperienced cybercriminals will leverage ransomware-as-a-service, magnifying the growth in ransomware.

Ransomware

Page 8: What’s in store? Cyber threats in 2016 and beyond

.

Wearables will be a prime target for cyber criminals because they collect personal data and they are relatively insecure back doors into smartphones.

Wearables

Wearables Attack Surfaces

Page 9: What’s in store? Cyber threats in 2016 and beyond

.

Attacks on automobiles will increase rapidly in 2016 due to the rapid increase in connected automobile hardware built without foundational security principles.

Automobiles

Automobile Attack Surfaces

Page 10: What’s in store? Cyber threats in 2016 and beyond

.

Critical infrastructure systems not designed with outside access in mind will become vulnerable to low-incident, but high-impact events as they become connected to the Internet.

Critical infrastructure

Page 11: What’s in store? Cyber threats in 2016 and beyond

.

Threat intelligence sharing among enterprises and security vendors will grow rapidly.

Sharing threat intelligence

Legislative steps will make it possible to share threat intelligence with government.

We will see an acceleration in the development of best practices for sharing emerging threat information.

Threat intelligence cooperatives between industry vendors will expand. STIX/TAXII will be the standard by which they share information.

Metrics for success will emerge, allowing enterprises, security vendors, and governments to quantify protection improvement.

Page 12: What’s in store? Cyber threats in 2016 and beyond

.

Looking Beyond 2016

Page 13: What’s in store? Cyber threats in 2016 and beyond

.

13

Q&A

McAfee Labs 2016 Threats PredictionsHardware

Ransomware

Vulnerabilities

Payment systems

Attacks through employee systems

Cloud services

Wearables

www.mcafee.com/2016threatspredictions

Automobiles

Warehouses of stolen data

Integrity

Cyber espionage

Hacktivism

Critical infrastructure

Sharing threat intelligence

McAfee Labs @McAfee_LabsRaj Samani @Raj_SamaniChristiaan Beek @ChristiaanBeekMatthew Rosenquist @Matt_RosenquistJeannette Jarvis @jarvisjBruce Snell @brucesnell

Continue the conversation! Tweet to #cybersec

Page 14: What’s in store? Cyber threats in 2016 and beyond

.