SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Gabriel Dusil
VP, Global Sales & Marketing

  www.facebook.com/gdusil
  cz.linkedin.com/in/gabrieldusil
  gdusil.wordpress.com
  dusilg@gmail.com
Permissions
 Limited access to approved data/systems

Access Control
 Password & Idle screen locking                                                Android

Isolation
 Limits an apps ability to access
  data or other system resources                                                                 Apple
                                                                                                  iOS
Encryption
 Conceal data at rest on the device

Provenance
 Apps are stamped to identity the
  author for tamper resistance
                                                                                          Experts in Network Behavior Analysis
                                                                                          Page 2, www.cognitive-security.com
                     Symantec - A Window Into Mobile Device Security (11.Jun)             © 2012, gdusil.wordpress.com
Mobile devices hold a rich
set of personal information:
   Location details
   browsing & call history
   contact lists & phone #’s
   SMS, email & Facebook
   Calendar details
   Passwords in clear text
   Premium-rate calling

Internet Access remains
a large vulnerability hole
Up-In-Coming Threats
 Micro-payment vulnerabilities
 Access to corporate server
 “LikeJacking”
                        McAfee - Mobility and Security Dazzling Opportunities,
                                                                                 Experts in Network Behavior Analysis
                                  Profound Challenges (11.May)                   Page 3, www.cognitive-security.com
                            LookOut - Mobile Threat Report (11.Aug)              © 2012, gdusil.wordpress.com
Recent Issues…                                                   Device Management Checklist
 iPhone “Root-kitting”
  • Bypassing device security                                                                         Cur- Next
                                                                  Description
 Theft of smartphones, & tablets                                                                     rent Gen
  • sensitive records compromised                                 Device Upgrade Flexibility                    
 Spoofed ActiveSync policy apps
  • Reporting higher security than                                Threat Analysis                                
    what is actually available                                    Location-Aware usage                          
 “Co-mingling”                                                   User Device Switching                         
  • Mixing private & corporate data
 Malware                                                         Device Policy Capabilities                    
  • Stealing data & bandwidth                                     Network Security                              
  • Uncertified apps with malware                                 Dynamic Corporate Policies                    
  • Capturing info & forwarding
                                                                  Scalability Expandability                     
                                                                  App & Data Security                           


                                                                                        Experts in Network Behavior Analysis
                                                                                        Page 4, www.cognitive-security.com
                          J. Gold - A Heuristic Approach to Mobile Security, ‘11        © 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
                                          Page 5, www.cognitive-security.com
LookOut - Mobile Threat Report (11.Aug)
                                          © 2012, gdusil.wordpress.com
Awareness of Company
Security and Data Protection
Policies for Mobile Devices:




Greatest Security Concerns for
               Mobile Devices

                                                                           Experts in Network Behavior Analysis
                  McAfee - Mobility and Security Dazzling Opportunities,   Page 6, www.cognitive-security.com
                            Profound Challenges (11.May)                   © 2012, gdusil.wordpress.com
Subscribers
 Mobile users are in early stages of
  facing significant mobile threats.
 Handsets hold sensitive data
  • Access to sensitive data (online
    banking, micro payments)
 Subscriber are unaware of mobile
  security threats and mitigation is
  largely ignored.
                                        Operators
                                         Lacking visibility to subscriber
                                          network activity & threats
                                          • mobile, land-line, & internet
                                          protection for subscribers
                                         Providing additional service value
                                         Preparing for future mobile threats

                                                             Experts in Network Behavior Analysis
                                                             Page 7, www.cognitive-security.com
                                                             © 2012, gdusil.wordpress.com
Maintenance and Repair
 Managing signature updates
 Cost of paying to fix systems
  infected by malware
Hardware Overhead
 Most anti-malware consume large
  amounts processing power,
  memory and storage space.
Lost Productivity
 Lost Productivity per employee
 Differing mobile Operating
  Systems to manage infections
Company Costs
 Due to stolen Mbytes of
  bandwidth from Malware

                                                                                           Experts in Network Behavior Analysis
                                LookOut - Mobile Threat Report (11.Aug)                    Page 8, www.cognitive-security.com
                   http://www.networksecurityjournal.com/features/malware-burden-012208/   © 2012, gdusil.wordpress.com
Subscribers used 79 MB per
month in ‘10,  125% from ‘09
 Expect a 16-fold increase (1.3 GB
  per month) by ‘15

Average mobile speed in ‘10
was 215 kbps,  2.2Mbps by
‘15.




                                                                             Experts in Network Behavior Analysis
                                                                             Page 9, www.cognitive-security.com
                    Cisco - Visual Networking Index Global Mobile Data '11   © 2012, gdusil.wordpress.com
Evolving Usage by App – (Allot)                                Monthly Data Usage – (Nielson)
                                                                             Android
 40%                                                            580
                                                                             Apple iPhone
 35%                                                                         Windows Mobile
                                                                480          BlackBerry
 30%
                                                                             Windows 7
 25%                                                            380
 20%       File Sharing
           Web Browsing
 15%       Video Steaming                                       280
           Other
 10%
           VoIP & IM                                            180
  5%
  0%                                                              80
                                                                          Q2'09 Q3'09 Q4'09 Q1'10 Q2'10


                Average– Mobile Trends, GlobalUsage Up 89% as Cost per MB Goes Down
                   Allot U.S. Smartphone Data Mobile Broadband Traffic Report 11.H1
                                                    46%                                   Experts in Network Behavior Analysis
                             http://blog.nielsen.com/nielsenwire/online_mobile/           Page 10, www.cognitive-security.com
               http://www.wired.com/wiredscience/2011/06/how-much-does-your-data-cost/    © 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
            Panda Security - Malware Statics, 11.Mar.16               Page 11, www.cognitive-security.com
Allot – Mobile Trends, Global Mobile Broadband Traffic Report 11.H1   © 2012, gdusil.wordpress.com
Malware bandwidth stolen
 From €15 to €60 per year0




                                                                                       €0.11


                                                                                                  €0.10
Accelerators
 Roaming will accelerate malware
  cost by over 30x1




                                                                                                               €0.08
 Multiple Malware instances 




                                                                                                                             €0.07
 Power Users are 25x more




                                                                                                                                        €0.06
  exposed to malware costs2

A Provider with 1m subscribers
- Vampire Costs would exceed
€30m per year3
                                                                           Smartphones Data Cost
        0   Based on 500 bytes/min typical = 21.6 MB per month @ €0.06 per MB, & up to 4 Malware per handset
            1Based on Roaming costs in Europe between € 1.2 and € 12 Euros per MB, 2Based on 2GB monthly

                                                            usage
                                 3Average two malware instances across the subscriber base

                       - http://ec.europa.eu/information_society/activities/roaming/data/index_en.htm                  Experts in Network Behavior Analysis
                    - Average U.S. Smartphone Data Usage Up 89% as Cost per MB Goes Down 46%                           Page 12, www.cognitive-security.com
                                      http://blog.nielsen.com/nielsenwire/online_mobile/                               © 2012, gdusil.wordpress.com
Malware acting as a
botnet will exploit
many vulnerabilities
 Abuse of premium-
  rate text messages
 Attacks gather
  sensitive data for
  commercial or
  political purposes
 Financial fraud as
  more mobile finance
  and payment apps
  emerge




                                                                             Experts in Network Behavior Analysis
                          LookOut - Mobile Threat Report (11.Aug)            Page 13, www.cognitive-security.com
                    Cisco - Visual Networking Index Global Mobile Data '11   © 2012, gdusil.wordpress.com
End-point protection
achieved by app suites
   Firewalls & VPN
   Disk Encryption
   Remote wiping
   Location-based services
   Anti-Malware

Infrastructure Security
utilizes
   Managed Security
   Flow statistics
   Policy compliance
   Intrusion detection
   Network Behavior Analysis
    • Separating normal behavior
      from anomalous behavior
                                   Experts in Network Behavior Analysis
                                   Page 14, www.cognitive-security.com
                                   © 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 15, www.cognitive-security.com
© 2012, gdusil.wordpress.com
Infrastructure   The            Identification   Mobile                     Suspected
Security         anomalies      of deployed      analyst                    (malicious)
using            detected by    malware will     services                   traffic is
Network          NBA will be    help single-     calls                      blocked,
Behavior         correlated     out the          subscriber                 filtered, or
Analysis         (cross-        malicious        to confirm,                diverted from
observe          referenced)    software         identify &                 the infected
mobile data      with data      & implement      eliminate                  device.
to identify      from the       mitigating       malicious                  Network
irregularities   handsets       steps to         behavior.                  traffic can be
which may be     where the      protect                                     optimized &
due to the       mobile anti-   subscribers                                 modeled in
malware          malware                                                    order to
activity         solutions                                                  improve
                 are                                                        reliability.
                 deployed.




                                                               Experts in Network Behavior Analysis
                                                               Page 16, www.cognitive-security.com
                                                               © 2012, gdusil.wordpress.com
Endpoint Security via security
suites for mobile handsets             “For €2 per month we will
 Via periodic signature updates       protect you against malware-
  sent to the handset                  stealing-bandwidth & lost
                                       productivity”
But Endpoint Security is reliant
on subscribers to install SW
Infrastructure Security is
necessary to protect mobile
subscribers
 Via Network Behavior Analysis,
  core traffic patterns are analyzed
  and normal behavior is separated
  from abnormal behavior to detect
  malware


                                                       Experts in Network Behavior Analysis
                                                       Page 17, www.cognitive-security.com
                                                       © 2012, gdusil.wordpress.com
 Increased Revenue -  ARPU
  • Value-added security services
 Core Infrastructure Cost Saving
  • Reduce “stolen” BW by malware
  • Increased security & network
    visibility - leads to efficient
    infrastructure spending
 Increased Client Satisfaction
  • Client trust in mobile carrier
    through safer mobile surfing
  • Protect transactions for online
    banking, & confidentiality
 Competitive Differentiation
  • Through enhanced security                            Increased Network Reliability
    services for corporate clients                          • From reduced malware instability
 Legal Conformity                                          • Data traffic prediction becomes
  • Protection of minors, dangerous, &                        more precise, through modeling of
    illegal content                                           legitimate applications

                                                                             Experts in Network Behavior Analysis
                                                                             Page 18, www.cognitive-security.com
                              ARPU – Average Revenue Per User                © 2012, gdusil.wordpress.com
                                      BW - Bandwidth
Security Innovation                   Product Stability
 Delivering Next Generations          5th Generation Network Behavior
  Security Solutions                    Analysis platform
Research & Development                Intuitive Management Interface
Expertise                              Easy-to-Use Dashboard
   Continual & Rapid development      Granular attack detection analysis
   Quick development turn-around
   Cost Effective R&D Resources
   Integration with OEMs, MSSPs, &
    Device manufacturers

Addressing Privacy Concerns
 Data anonymity is maintained



                                                          Experts in Network Behavior Analysis
                                                          Page 19, www.cognitive-security.com
                                                          © 2012, gdusil.wordpress.com
“The number of times an                                       “… mobile operators will try to
uninteresting thing happens                                   prevent threats at the network
is an interesting thing.”                                     level… ‘If the mobile operators
 Marcus Ranum                                                pushed out antivirus to their
  “laws of intrusion detection.”                              customers’ devices, it would
                                                              scare users … So operators are
“Cybercriminals are investing                                 keen to solve security issues
more toward ‘R&D’ to find ways
to use mobile devices and                                     themselves at the network
penetrate the cloud to seize the                              level.”
data they need to make a profit                                Gareth Machlachlan
or undermine a company’s                                        Chief Operating Officer
success.”




                                Cisco - Annual Security Report '11               Experts in Network Behavior Analysis
                        TechTarget - Security Tech Guide Mobile '11, “Mobile     Page 20, www.cognitive-security.com
                        Phone Security Threats, Blended Attacks Increasing”      © 2012, gdusil.wordpress.com
http://gdusil.wordpress.com/2013/03/08/telco-and-mobile-security-12/




                                                        Experts in Network Behavior Analysis
                                                        Page 21, www.cognitive-security.com
                                                        © 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis
Page 22, www.cognitive-security.com
© 2012, gdusil.wordpress.com
 As mobile data is expected to grow 16 fold over the next four years*, mobile
  providers are facing new challenges in balancing subscriber ease-of-use, with
  cyber-security protection. This explosion in cellular usage and mobile
  commerce will require advanced levels of protection for mobile users, as
  hackers continue to find vulnerabilities to exploit. A dual strategy which
  includes end-point and infrastructure security will provide robust and cost
  effective levels of protection, which will also expand provider revenue streams
  to enhanced services, and increase ARPU through value added security
  solutions. Network Behavior Analysis is a viable building block to
  infrastructure security, and helps to protects a collective subscriber base
  against sophisticated mobile cyber-attacks.
  • *Cisco - Visual Networking Index Global Mobile Data '11
    ARPU – Average Revenue Per User




                                                              Experts in Network Behavior Analysis
                                                              Page 23, www.cognitive-security.com
                                                              © 2012, gdusil.wordpress.com
Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis,
Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident
Response, Security as a Service, SaaS, Managed Security Services,
MSS, Monitoring & Management, Advanced Persistent Threats, APT,
Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern
Sophisticated Attacks, MSA, Non-Signature Detection, Artificial
Intelligence, A.I., AI, Security Innovation, Mobile security, Cognitive
Security, Cognitive Analyst, Forensics analysis




                                                      Experts in Network Behavior Analysis
                                                      Page 24, www.cognitive-security.com
                                                      © 2012, gdusil.wordpress.com

Contenu connexe

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cognitive Security - Telco & Mobile Security ('12)

  • 1. Gabriel Dusil VP, Global Sales & Marketing www.facebook.com/gdusil cz.linkedin.com/in/gabrieldusil gdusil.wordpress.com dusilg@gmail.com
  • 2. Permissions  Limited access to approved data/systems Access Control  Password & Idle screen locking Android Isolation  Limits an apps ability to access data or other system resources Apple iOS Encryption  Conceal data at rest on the device Provenance  Apps are stamped to identity the author for tamper resistance Experts in Network Behavior Analysis Page 2, www.cognitive-security.com Symantec - A Window Into Mobile Device Security (11.Jun) © 2012, gdusil.wordpress.com
  • 3. Mobile devices hold a rich set of personal information:  Location details  browsing & call history  contact lists & phone #’s  SMS, email & Facebook  Calendar details  Passwords in clear text  Premium-rate calling Internet Access remains a large vulnerability hole Up-In-Coming Threats  Micro-payment vulnerabilities  Access to corporate server  “LikeJacking” McAfee - Mobility and Security Dazzling Opportunities, Experts in Network Behavior Analysis Profound Challenges (11.May) Page 3, www.cognitive-security.com LookOut - Mobile Threat Report (11.Aug) © 2012, gdusil.wordpress.com
  • 4. Recent Issues… Device Management Checklist  iPhone “Root-kitting” • Bypassing device security Cur- Next Description  Theft of smartphones, & tablets rent Gen • sensitive records compromised Device Upgrade Flexibility    Spoofed ActiveSync policy apps • Reporting higher security than Threat Analysis   what is actually available Location-Aware usage    “Co-mingling” User Device Switching   • Mixing private & corporate data  Malware Device Policy Capabilities   • Stealing data & bandwidth Network Security   • Uncertified apps with malware Dynamic Corporate Policies   • Capturing info & forwarding Scalability Expandability   App & Data Security   Experts in Network Behavior Analysis Page 4, www.cognitive-security.com J. Gold - A Heuristic Approach to Mobile Security, ‘11 © 2012, gdusil.wordpress.com
  • 5. Experts in Network Behavior Analysis Page 5, www.cognitive-security.com LookOut - Mobile Threat Report (11.Aug) © 2012, gdusil.wordpress.com
  • 6. Awareness of Company Security and Data Protection Policies for Mobile Devices: Greatest Security Concerns for Mobile Devices Experts in Network Behavior Analysis McAfee - Mobility and Security Dazzling Opportunities, Page 6, www.cognitive-security.com Profound Challenges (11.May) © 2012, gdusil.wordpress.com
  • 7. Subscribers  Mobile users are in early stages of facing significant mobile threats.  Handsets hold sensitive data • Access to sensitive data (online banking, micro payments)  Subscriber are unaware of mobile security threats and mitigation is largely ignored. Operators  Lacking visibility to subscriber network activity & threats • mobile, land-line, & internet   protection for subscribers  Providing additional service value  Preparing for future mobile threats Experts in Network Behavior Analysis Page 7, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 8. Maintenance and Repair  Managing signature updates  Cost of paying to fix systems infected by malware Hardware Overhead  Most anti-malware consume large amounts processing power, memory and storage space. Lost Productivity  Lost Productivity per employee  Differing mobile Operating Systems to manage infections Company Costs  Due to stolen Mbytes of bandwidth from Malware Experts in Network Behavior Analysis LookOut - Mobile Threat Report (11.Aug) Page 8, www.cognitive-security.com http://www.networksecurityjournal.com/features/malware-burden-012208/ © 2012, gdusil.wordpress.com
  • 9. Subscribers used 79 MB per month in ‘10,  125% from ‘09  Expect a 16-fold increase (1.3 GB per month) by ‘15 Average mobile speed in ‘10 was 215 kbps,  2.2Mbps by ‘15. Experts in Network Behavior Analysis Page 9, www.cognitive-security.com Cisco - Visual Networking Index Global Mobile Data '11 © 2012, gdusil.wordpress.com
  • 10. Evolving Usage by App – (Allot) Monthly Data Usage – (Nielson) Android 40% 580 Apple iPhone 35% Windows Mobile 480 BlackBerry 30% Windows 7 25% 380 20% File Sharing Web Browsing 15% Video Steaming 280 Other 10% VoIP & IM 180 5% 0% 80 Q2'09 Q3'09 Q4'09 Q1'10 Q2'10 Average– Mobile Trends, GlobalUsage Up 89% as Cost per MB Goes Down Allot U.S. Smartphone Data Mobile Broadband Traffic Report 11.H1 46% Experts in Network Behavior Analysis http://blog.nielsen.com/nielsenwire/online_mobile/ Page 10, www.cognitive-security.com http://www.wired.com/wiredscience/2011/06/how-much-does-your-data-cost/ © 2012, gdusil.wordpress.com
  • 11. Experts in Network Behavior Analysis Panda Security - Malware Statics, 11.Mar.16 Page 11, www.cognitive-security.com Allot – Mobile Trends, Global Mobile Broadband Traffic Report 11.H1 © 2012, gdusil.wordpress.com
  • 12. Malware bandwidth stolen  From €15 to €60 per year0 €0.11 €0.10 Accelerators  Roaming will accelerate malware cost by over 30x1 €0.08  Multiple Malware instances  €0.07  Power Users are 25x more €0.06 exposed to malware costs2 A Provider with 1m subscribers - Vampire Costs would exceed €30m per year3 Smartphones Data Cost 0 Based on 500 bytes/min typical = 21.6 MB per month @ €0.06 per MB, & up to 4 Malware per handset 1Based on Roaming costs in Europe between € 1.2 and € 12 Euros per MB, 2Based on 2GB monthly usage 3Average two malware instances across the subscriber base - http://ec.europa.eu/information_society/activities/roaming/data/index_en.htm Experts in Network Behavior Analysis - Average U.S. Smartphone Data Usage Up 89% as Cost per MB Goes Down 46% Page 12, www.cognitive-security.com http://blog.nielsen.com/nielsenwire/online_mobile/ © 2012, gdusil.wordpress.com
  • 13. Malware acting as a botnet will exploit many vulnerabilities  Abuse of premium- rate text messages  Attacks gather sensitive data for commercial or political purposes  Financial fraud as more mobile finance and payment apps emerge Experts in Network Behavior Analysis LookOut - Mobile Threat Report (11.Aug) Page 13, www.cognitive-security.com Cisco - Visual Networking Index Global Mobile Data '11 © 2012, gdusil.wordpress.com
  • 14. End-point protection achieved by app suites  Firewalls & VPN  Disk Encryption  Remote wiping  Location-based services  Anti-Malware Infrastructure Security utilizes  Managed Security  Flow statistics  Policy compliance  Intrusion detection  Network Behavior Analysis • Separating normal behavior from anomalous behavior Experts in Network Behavior Analysis Page 14, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 15. Experts in Network Behavior Analysis Page 15, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 16. Infrastructure The Identification Mobile Suspected Security anomalies of deployed analyst (malicious) using detected by malware will services traffic is Network NBA will be help single- calls blocked, Behavior correlated out the subscriber filtered, or Analysis (cross- malicious to confirm, diverted from observe referenced) software identify & the infected mobile data with data & implement eliminate device. to identify from the mitigating malicious Network irregularities handsets steps to behavior. traffic can be which may be where the protect optimized & due to the mobile anti- subscribers modeled in malware malware order to activity solutions improve are reliability. deployed. Experts in Network Behavior Analysis Page 16, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 17. Endpoint Security via security suites for mobile handsets “For €2 per month we will  Via periodic signature updates protect you against malware- sent to the handset stealing-bandwidth & lost productivity” But Endpoint Security is reliant on subscribers to install SW Infrastructure Security is necessary to protect mobile subscribers  Via Network Behavior Analysis, core traffic patterns are analyzed and normal behavior is separated from abnormal behavior to detect malware Experts in Network Behavior Analysis Page 17, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 18.  Increased Revenue -  ARPU • Value-added security services  Core Infrastructure Cost Saving • Reduce “stolen” BW by malware • Increased security & network visibility - leads to efficient infrastructure spending  Increased Client Satisfaction • Client trust in mobile carrier through safer mobile surfing • Protect transactions for online banking, & confidentiality  Competitive Differentiation • Through enhanced security  Increased Network Reliability services for corporate clients • From reduced malware instability  Legal Conformity • Data traffic prediction becomes • Protection of minors, dangerous, & more precise, through modeling of illegal content legitimate applications Experts in Network Behavior Analysis Page 18, www.cognitive-security.com ARPU – Average Revenue Per User © 2012, gdusil.wordpress.com BW - Bandwidth
  • 19. Security Innovation Product Stability  Delivering Next Generations  5th Generation Network Behavior Security Solutions Analysis platform Research & Development Intuitive Management Interface Expertise  Easy-to-Use Dashboard  Continual & Rapid development  Granular attack detection analysis  Quick development turn-around  Cost Effective R&D Resources  Integration with OEMs, MSSPs, & Device manufacturers Addressing Privacy Concerns  Data anonymity is maintained Experts in Network Behavior Analysis Page 19, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 20. “The number of times an “… mobile operators will try to uninteresting thing happens prevent threats at the network is an interesting thing.” level… ‘If the mobile operators  Marcus Ranum pushed out antivirus to their “laws of intrusion detection.” customers’ devices, it would scare users … So operators are “Cybercriminals are investing keen to solve security issues more toward ‘R&D’ to find ways to use mobile devices and themselves at the network penetrate the cloud to seize the level.” data they need to make a profit  Gareth Machlachlan or undermine a company’s Chief Operating Officer success.” Cisco - Annual Security Report '11 Experts in Network Behavior Analysis TechTarget - Security Tech Guide Mobile '11, “Mobile Page 20, www.cognitive-security.com Phone Security Threats, Blended Attacks Increasing” © 2012, gdusil.wordpress.com
  • 21. http://gdusil.wordpress.com/2013/03/08/telco-and-mobile-security-12/ Experts in Network Behavior Analysis Page 21, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 22. Experts in Network Behavior Analysis Page 22, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 23.  As mobile data is expected to grow 16 fold over the next four years*, mobile providers are facing new challenges in balancing subscriber ease-of-use, with cyber-security protection. This explosion in cellular usage and mobile commerce will require advanced levels of protection for mobile users, as hackers continue to find vulnerabilities to exploit. A dual strategy which includes end-point and infrastructure security will provide robust and cost effective levels of protection, which will also expand provider revenue streams to enhanced services, and increase ARPU through value added security solutions. Network Behavior Analysis is a viable building block to infrastructure security, and helps to protects a collective subscriber base against sophisticated mobile cyber-attacks. • *Cisco - Visual Networking Index Global Mobile Data '11 ARPU – Average Revenue Per User Experts in Network Behavior Analysis Page 23, www.cognitive-security.com © 2012, gdusil.wordpress.com
  • 24. Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis, Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident Response, Security as a Service, SaaS, Managed Security Services, MSS, Monitoring & Management, Advanced Persistent Threats, APT, Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern Sophisticated Attacks, MSA, Non-Signature Detection, Artificial Intelligence, A.I., AI, Security Innovation, Mobile security, Cognitive Security, Cognitive Analyst, Forensics analysis Experts in Network Behavior Analysis Page 24, www.cognitive-security.com © 2012, gdusil.wordpress.com