SlideShare une entreprise Scribd logo
1  sur  44
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 1Yair Amit, Co-founder, CTO, Skycure December 2015
Mobile Security: 2015 Wrap-up and 2016 Predictions
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 2
Meet Your Speaker
Yair Amit
Co-founder and CTO
Skycure
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 3
Quick Housekeeping
• Q&A panel is available if you have any questions
• There will be time for Q&A at the end
• We are recording this webinar for future viewing
• All attendees will receive a copy of slides/recording
Join the discussion #MobileThreatDefense
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 4
Agenda
1. Highlights of 2015
2. 2016 Predictions
3. Mobile Security Plan
4. Q&A
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 5© 2015 Skycure Inc. - Confidential
Highlights of 2015
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 6
Modern Mobile Attacks
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 7
Physical Security
Loss
Theft
Unauthorized
Access
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 8
Network Security
Wi-Fi/
Cellular
Off-the-
shelf
hacking
gear
24x7
Exposure
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 9
SSL Decryption – A Growing Concern
92%
of users click on “Continue”
compromising their Exchange identity
(username and password)
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 10
”
Plain HTTP
Does it really
happen today?
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 11
SwiftKey Vulnerability
600 million Android (Samsung) devices vulnerable
PRE-INSTALLED
KEYBOARD
UNENCRYPTED
UPDATES
MITM
SYSTEM
ACCESS
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 12
“No iOS Zone”
iOS crashes
“No iOS Zone” exploited again
iPhone crashes again
Device restarts
and again
and again
and again
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 13
Malware
External
Stores
Repackaged
Apps
New
infection
vectors
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 14
XcodeGhost
• Lures developers into using a malicious development environment
• Malicious apps were approved by Apple and made it to the AppStore
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 15
YiSpecter
• Impacts both jailbroken and non-jailbroken devices
• First major iOS malware that uses Apple’s private APIs
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 16
Vulnerabilities
OS & App
Level
Patching
Challenges
Never
Ending
Story
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 17
Known iOS Vulnerabilities - Apr. 15’ Est.
0
20
40
60
80
100
120
140
160
180
2007 2008 2009 2010 2011 2012 2013 2014 2015
Number of CVEs Trajectory (Apr 15')
Source: Skycure analysis based of CVEdetails.com
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 18
Known iOS Vulnerabilities - Final
Source: Skycure analysis based of CVEdetails.com
0
50
100
150
200
250
300
350
400
2007 2008 2009 2010 2011 2012 2013 2014 2015
Number of CVEs
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 19© 2015 Skycure Inc. - Confidential
Mobile Security Threat Reports
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 20
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 21
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 22
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 23
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 24
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 25© 2015 Skycure Inc. - Confidential
2016 Predictions
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 26
Android malware will continue to evolve
2011
Google Play is
riddled with
malware
2015
Google Play is
riddled with
malware
3rd party stores
are riddled with
malware
Google introduces
technologies such as
“Bouncer” and “Verify Apps”
What next?
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 27
Malware Scanners Effectiveness
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 28
Multi-Factor
Authentication will
be Further
Embraced by Users
• Stealing a password will continue to become less effective
• Greater reliance on mobile devices
• Result – attackers focus their hacking campaigns on mobile devices
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 29
Hackers will
Leverage Mobile to
Attack Enterprises
• Utilization of a growing arsenal of attacking tools
• Mobile as an easy springboard to corporate resources
• Focus on exploiting human and software vulnerabilities via network and
application-level attack vectors
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 30
Healthcare
adoption of
mobility will
continue to grow
70% of Doctors would use mobility
to manage patient data: A growth
from ~8% just 2 years ago
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 31
10+ Billion
Connected
Devices in
3 Years
• Wearables to monitor more health data
• Healthcare data is worth a lot
• Hackers to focus on unsecured healthcare apps/devices
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 32
Mobile payments
will gain more
traction
• Mobile payment volume in the US will grow to
$818 Billion by 2019.
• Starbucks: 8 million mobile transactions per week.
21% of total sales.
• 2% of transactions at top 5 retailers are through
Apple Pay.
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 33© 2015 Skycure Inc. - Confidential
Mobile Security Plan
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 34
Old Endpoint Vs. New Endpoint
IPS
IDS
FIREWALL
USB
SECURITY
DLP
DATA
ENCRYPTION
WIRELESS SECURITY
APPLICATION CONTROL
AV
?
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 35
4 Tips for CIOs
Predict
Identify high-risk
situations in
advance using
crowd wisdom
Detect
Find mobile
threats
before they
reach your
organization
Prevent
Stop threats
automatically
using existing
policies
Adapt
Learn from the
new threats to
adapt your
security policy
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 36
You need “Waze”
• Protect against known, unknown and
ZERO-day attacks
Malware: How do you predict next-gen malware attacks?
Exploit: How do you know if the exploit was not tailor-made for your organization?
Network: How do you know if the network you connect to is real or fake?
Predict
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 37
Predict
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 38
Comprehensive Detection Detect
Applications
• Policy Violations
• Malware
Vulnerabilities
• iOS & Android
• CVSS – Open Standard
Device
• Lost
• Stolen
• Imporper Configuration
Networks
• Suspicious
• Malicious
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 39
Automated Remediation
• No CIO or IT needs yet
another console to look at
• Use your EXISTING tools
and policies
- SIEM
- EMM/MDM
- VPN
- Email servers
Predict
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 40
Adapt
1. Learn from the new threats
2. Identify top attacked people/departments
3. Educate them
4. Do cyber-security drills
Adapt
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 41
Skycure Mobile Threat Defense
• Seamless experience
• 24x7 detection and protection
• Device, app, and network analysis
• Multi platform – Android and iOS
Employee
• Flexible deployment
• Policy creation and enforcement
• Reporting and compliance
• Enterprise integrations
IT Team
Mobile Threat Intelligence
• Millions of tests per month
• Millions of networks and apps analyzed
• Zero-day threat protection
• Predictive Security
Attack
Vector
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 42
c
https://maps.skycure.com
c
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 43
Summary
• The problem of mobile security is real and is already here
• An ideal solution should offer layered security:
- Physical compromise
- Network attacks
- Malware infections
- Vulnerabilities
• Enterprises are moving towards
risk-based mobility
• Skycure is leading the charter
ATTACK
VECTO
R
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 44
Next Steps
Request a FREE 30 Day Trial!
sales@skycure.com, Phone: 1-800-650-4821
https://www.skycure.com/trial
https://blog.skycure.com
@SkycureSecurity, @yairamit
https://www.linkedin.com/company/skycure

Contenu connexe

Tendances

Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection securityIBM Security
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business InsecuritiesPing Identity
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsNowSecure
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNowSecure
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present DangerPing Identity
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowNowSecure
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsCraig Walker, CISSP
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018NowSecure
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 

Tendances (20)

Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 
Samsung KNOX for Dummies
Samsung KNOX for DummiesSamsung KNOX for Dummies
Samsung KNOX for Dummies
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 

En vedette

Yahoo Upfront 2016- wrap up
Yahoo Upfront 2016- wrap up Yahoo Upfront 2016- wrap up
Yahoo Upfront 2016- wrap up Laura Spencer
 
Ces 2016 wrap up - Touching the future
Ces 2016 wrap up - Touching the futureCes 2016 wrap up - Touching the future
Ces 2016 wrap up - Touching the futureVidal Chriqui
 
Qualities of good technical writing with examples
Qualities of good technical writing with examplesQualities of good technical writing with examples
Qualities of good technical writing with examplesmuhammad ilyas
 
Cohesion and coherence
Cohesion and coherenceCohesion and coherence
Cohesion and coherencePhuoc Trinh
 
Edukasyon sa Pagpapakatao 9- Karapatan at Tungkulin
Edukasyon sa Pagpapakatao 9- Karapatan at Tungkulin Edukasyon sa Pagpapakatao 9- Karapatan at Tungkulin
Edukasyon sa Pagpapakatao 9- Karapatan at Tungkulin Charm Sanugab
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 

En vedette (8)

Yahoo Upfront 2016- wrap up
Yahoo Upfront 2016- wrap up Yahoo Upfront 2016- wrap up
Yahoo Upfront 2016- wrap up
 
Ces 2016 wrap up - Touching the future
Ces 2016 wrap up - Touching the futureCes 2016 wrap up - Touching the future
Ces 2016 wrap up - Touching the future
 
Security threats
Security threatsSecurity threats
Security threats
 
Qualities of good technical writing with examples
Qualities of good technical writing with examplesQualities of good technical writing with examples
Qualities of good technical writing with examples
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Cohesion and coherence
Cohesion and coherenceCohesion and coherence
Cohesion and coherence
 
Edukasyon sa Pagpapakatao 9- Karapatan at Tungkulin
Edukasyon sa Pagpapakatao 9- Karapatan at Tungkulin Edukasyon sa Pagpapakatao 9- Karapatan at Tungkulin
Edukasyon sa Pagpapakatao 9- Karapatan at Tungkulin
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Similaire à Mobile Security - 2015 Wrap-up and 2016 Predictions

Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroSkycure
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelSkybox Security
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Ghostery, Inc.
 
Developing Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeDeveloping Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeGhostery, Inc.
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíMarketingArrowECS_CZ
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 

Similaire à Mobile Security - 2015 Wrap-up and 2016 Predictions (20)

Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
 
Developing Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeDeveloping Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy Landscape
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 

Mobile Security - 2015 Wrap-up and 2016 Predictions

  • 1. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 1Yair Amit, Co-founder, CTO, Skycure December 2015 Mobile Security: 2015 Wrap-up and 2016 Predictions
  • 2. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 2 Meet Your Speaker Yair Amit Co-founder and CTO Skycure
  • 3. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 3 Quick Housekeeping • Q&A panel is available if you have any questions • There will be time for Q&A at the end • We are recording this webinar for future viewing • All attendees will receive a copy of slides/recording Join the discussion #MobileThreatDefense
  • 4. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 4 Agenda 1. Highlights of 2015 2. 2016 Predictions 3. Mobile Security Plan 4. Q&A
  • 5. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 5© 2015 Skycure Inc. - Confidential Highlights of 2015
  • 6. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 6 Modern Mobile Attacks
  • 7. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 7 Physical Security Loss Theft Unauthorized Access
  • 8. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 8 Network Security Wi-Fi/ Cellular Off-the- shelf hacking gear 24x7 Exposure
  • 9. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 9 SSL Decryption – A Growing Concern 92% of users click on “Continue” compromising their Exchange identity (username and password)
  • 10. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 10 ” Plain HTTP Does it really happen today?
  • 11. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 11 SwiftKey Vulnerability 600 million Android (Samsung) devices vulnerable PRE-INSTALLED KEYBOARD UNENCRYPTED UPDATES MITM SYSTEM ACCESS
  • 12. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 12 “No iOS Zone” iOS crashes “No iOS Zone” exploited again iPhone crashes again Device restarts and again and again and again
  • 13. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 13 Malware External Stores Repackaged Apps New infection vectors
  • 14. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 14 XcodeGhost • Lures developers into using a malicious development environment • Malicious apps were approved by Apple and made it to the AppStore
  • 15. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 15 YiSpecter • Impacts both jailbroken and non-jailbroken devices • First major iOS malware that uses Apple’s private APIs
  • 16. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 16 Vulnerabilities OS & App Level Patching Challenges Never Ending Story
  • 17. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 17 Known iOS Vulnerabilities - Apr. 15’ Est. 0 20 40 60 80 100 120 140 160 180 2007 2008 2009 2010 2011 2012 2013 2014 2015 Number of CVEs Trajectory (Apr 15') Source: Skycure analysis based of CVEdetails.com
  • 18. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 18 Known iOS Vulnerabilities - Final Source: Skycure analysis based of CVEdetails.com 0 50 100 150 200 250 300 350 400 2007 2008 2009 2010 2011 2012 2013 2014 2015 Number of CVEs
  • 19. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 19© 2015 Skycure Inc. - Confidential Mobile Security Threat Reports
  • 20. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 20
  • 21. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 21
  • 22. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 22
  • 23. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 23
  • 24. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 24
  • 25. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 25© 2015 Skycure Inc. - Confidential 2016 Predictions
  • 26. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 26 Android malware will continue to evolve 2011 Google Play is riddled with malware 2015 Google Play is riddled with malware 3rd party stores are riddled with malware Google introduces technologies such as “Bouncer” and “Verify Apps” What next?
  • 27. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 27 Malware Scanners Effectiveness
  • 28. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 28 Multi-Factor Authentication will be Further Embraced by Users • Stealing a password will continue to become less effective • Greater reliance on mobile devices • Result – attackers focus their hacking campaigns on mobile devices
  • 29. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 29 Hackers will Leverage Mobile to Attack Enterprises • Utilization of a growing arsenal of attacking tools • Mobile as an easy springboard to corporate resources • Focus on exploiting human and software vulnerabilities via network and application-level attack vectors
  • 30. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 30 Healthcare adoption of mobility will continue to grow 70% of Doctors would use mobility to manage patient data: A growth from ~8% just 2 years ago
  • 31. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 31 10+ Billion Connected Devices in 3 Years • Wearables to monitor more health data • Healthcare data is worth a lot • Hackers to focus on unsecured healthcare apps/devices
  • 32. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 32 Mobile payments will gain more traction • Mobile payment volume in the US will grow to $818 Billion by 2019. • Starbucks: 8 million mobile transactions per week. 21% of total sales. • 2% of transactions at top 5 retailers are through Apple Pay.
  • 33. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 33© 2015 Skycure Inc. - Confidential Mobile Security Plan
  • 34. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 34 Old Endpoint Vs. New Endpoint IPS IDS FIREWALL USB SECURITY DLP DATA ENCRYPTION WIRELESS SECURITY APPLICATION CONTROL AV ?
  • 35. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 35 4 Tips for CIOs Predict Identify high-risk situations in advance using crowd wisdom Detect Find mobile threats before they reach your organization Prevent Stop threats automatically using existing policies Adapt Learn from the new threats to adapt your security policy
  • 36. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 36 You need “Waze” • Protect against known, unknown and ZERO-day attacks Malware: How do you predict next-gen malware attacks? Exploit: How do you know if the exploit was not tailor-made for your organization? Network: How do you know if the network you connect to is real or fake? Predict
  • 37. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 37 Predict
  • 38. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 38 Comprehensive Detection Detect Applications • Policy Violations • Malware Vulnerabilities • iOS & Android • CVSS – Open Standard Device • Lost • Stolen • Imporper Configuration Networks • Suspicious • Malicious
  • 39. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 39 Automated Remediation • No CIO or IT needs yet another console to look at • Use your EXISTING tools and policies - SIEM - EMM/MDM - VPN - Email servers Predict
  • 40. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 40 Adapt 1. Learn from the new threats 2. Identify top attacked people/departments 3. Educate them 4. Do cyber-security drills Adapt
  • 41. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 41 Skycure Mobile Threat Defense • Seamless experience • 24x7 detection and protection • Device, app, and network analysis • Multi platform – Android and iOS Employee • Flexible deployment • Policy creation and enforcement • Reporting and compliance • Enterprise integrations IT Team Mobile Threat Intelligence • Millions of tests per month • Millions of networks and apps analyzed • Zero-day threat protection • Predictive Security Attack Vector
  • 42. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 42 c https://maps.skycure.com c
  • 43. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 43 Summary • The problem of mobile security is real and is already here • An ideal solution should offer layered security: - Physical compromise - Network attacks - Malware infections - Vulnerabilities • Enterprises are moving towards risk-based mobility • Skycure is leading the charter ATTACK VECTO R
  • 44. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 44 Next Steps Request a FREE 30 Day Trial! sales@skycure.com, Phone: 1-800-650-4821 https://www.skycure.com/trial https://blog.skycure.com @SkycureSecurity, @yairamit https://www.linkedin.com/company/skycure