SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
2015 Global Threat
Intelligence Report
An analysis of security trends in the
Financial Services industry
• over 6 billion attacks
• trillions of logs
• over 18,000 clients
• 28% Financial Services
industry respondents
Data gathered from NTT security
companies and NTT’s live Global
Threat Intelligence Platform
56% of attacks
originate from
IP addresses
within the US
but attackers
could be
anywhere in
the world
Attack analysis
Attack sources
US
56% China
9%
France
2%
India
1.5%
Germany
2%
Netherlands
2%
Denmark
1.1%
Russia
2%
Ukraine
1.3%
Canada
0.9%
Australia
9%
Rest 9%
UK
3%
Attacks by sector
• Finance sector still #1 target
with 18% of all detected attacks
Finance
0%
2%
4%
8%
10%
12%
14%
16%
18%
6%
Business
&professional
Manufacturing
Retail
Healthcare
Technology
Education
Government
Pharmaceuticals
Insurance
Transport&
distribution
Gaming
Media
Hospitality,leisure
&entertainment
Non-profit
Other
• However, this is a slight decrease of
2% from the previous year
Attacks and incident response
• Reconnaissance activity from 4% to 10%
• Crafted attacks on targeted victims more common
Other 5%
Known Bad Source 3%
Evasion Attempts 3%
DoS / DDoS 5%
Application
Specific Attack 7%
Reconaissance 10%
Anomalous Activity 20%
Network Manipulation 18%
Web Application Attack 15%
Service Specific Attack 14%
Attacks by type
6% 32%of all Malware attacks are in the
Financial Services sector
Malware attacks have reduced 2%
year-on-year in this sector
The Financial Services sector has one
of the lowest Malware attack rates.
of Incident Response Engagements came
from the Financial Services industry.
The sector’s sensitivity to attacks has
driven the prevalence of formal incident
response processes and procedures.
The sector’s response rate is twice that 	
of the next most active sector, 		
Business Services (16%)
dimensiondata.com/globalthreatreport #GlobalThreatReport
Threat intelligence defined
2. Raw information
collected based on
requirements
3. Information
processed  exploited
4. Intelligence
analysis
 production
1.Consumer needs,
planning, requirements
 direction
5. Dissemination
of product
to consumer
Attacks have shifted
from application
to user
7 / 10 vulnerabilities
relate to end-user systems
Users connected
to public network
using personal,
and often more
vulnerable devices
End-user exploits
spike after weekends
/ holidays when
users reconnect
End-user systems
often have unpatched
vulnerabilities
• 76% of vulnerabilities
+ 2 years old
• 9% of those +10 years old
The user is the perimeter
7/10
Vulnerabilities targeted in exploit kits
Cybercrime is
$$ $ $$ $Software exploit kits sold in hacking forums 	 hackers take advantage
of unpatched flaws install malicious software on vulnerable devices
Increased focus on Adobe Flash since security on Java and Internet Explorer improved in 2014.
Java
Adobe Acrobat
Internet Explorer
Adobe Flash
Firefox
Windows
Silverlight
Others
2013 2014
110
100
90
80
70
60
50
40
30
20
10
0
Changing profile of cybercriminals
Organised crime groups
with considerable resources
and expertise
Attacks motivated by:
• profit
• botnet infrastructure
• extortion
• fame/notoriety
• hacktivism
Incident response  threat intelligence
• Incident response 	
capabilities maturing 		
at a slow pace.
• 74% of organisations
have no formal incident
response plan.
Average incident
response time
Organisations
with no
vulnerability
management
programme take
nearly 200 days to
patch vulnerabilities
with CVSS score
of 4.0 or more
The threat
intelligence cycle
Our approach to
successful threat
intelligence helps
numerous enterprises
stay protected

Contenu connexe

Tendances

Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]Citrix
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
7 steps to developing a mobile device policy
7 steps to developing a mobile device policy7 steps to developing a mobile device policy
7 steps to developing a mobile device policyfudallst
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Wheatstone
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Resilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineResilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineCognizant
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalNETSCOUT
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...PacketTrap Msp
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Cloud Insights from 110 Projects
Cloud Insights from 110 ProjectsCloud Insights from 110 Projects
Cloud Insights from 110 ProjectsNone
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and LearningCitrix
 

Tendances (20)

Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
7 steps to developing a mobile device policy
7 steps to developing a mobile device policy7 steps to developing a mobile device policy
7 steps to developing a mobile device policy
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Resilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineResilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural Discipline
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a Hospital
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Cloud Insights from 110 Projects
Cloud Insights from 110 ProjectsCloud Insights from 110 Projects
Cloud Insights from 110 Projects
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless Experience
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 

Similaire à 2015 Global Threat Intelligence Report

2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trendsDImension Data
 
The State of Endpoint Security Today
The State of Endpoint Security Today The State of Endpoint Security Today
The State of Endpoint Security Today Justine Shaffer
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3NTT Innovation Institute Inc.
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101Welch LLP
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportThe Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportSimona Franciosi
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 

Similaire à 2015 Global Threat Intelligence Report (20)

2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
The State of Endpoint Security Today
The State of Endpoint Security Today The State of Endpoint Security Today
The State of Endpoint Security Today
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportThe Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence Report
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 

Plus de DImension Data

Cisco spark - reinventing collaboration
Cisco spark - reinventing collaborationCisco spark - reinventing collaboration
Cisco spark - reinventing collaborationDImension Data
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de FranceDImension Data
 
Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDImension Data
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldDImension Data
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! DImension Data
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de FranceDImension Data
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edgeDImension Data
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 daysDImension Data
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersDImension Data
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceDImension Data
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international universityDImension Data
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivityDImension Data
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connectionsDImension Data
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves livesDImension Data
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeDImension Data
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitDImension Data
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDImension Data
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandateDImension Data
 
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDImension Data
 
Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?DImension Data
 

Plus de DImension Data (20)

Cisco spark - reinventing collaboration
Cisco spark - reinventing collaborationCisco spark - reinventing collaboration
Cisco spark - reinventing collaboration
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de France
 
Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de france
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the world
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on!
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edge
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 days
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customers
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de france
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international university
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivity
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connections
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves lives
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safe
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ Summit
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case study
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandate
 
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top EmployersDimension Data has been recognised as one of only 5 Top Global Top Employers
Dimension Data has been recognised as one of only 5 Top Global Top Employers
 
Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?Virtualisation to cloud - are we there yet?
Virtualisation to cloud - are we there yet?
 

Dernier

In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.hyt3577
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfCocity Enterprises
 
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.hyt3577
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...Henry Tapper
 
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdfSeeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdfAshis Kumar Dey
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirementsmarketingkingdomofku
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...janibaber266
 
Black magic specialist in Canada (Kala ilam specialist in UK) Bangali Amil ba...
Black magic specialist in Canada (Kala ilam specialist in UK) Bangali Amil ba...Black magic specialist in Canada (Kala ilam specialist in UK) Bangali Amil ba...
Black magic specialist in Canada (Kala ilam specialist in UK) Bangali Amil ba...batoole333
 
Famous Kala Jadu, Kala ilam specialist in USA and Bangali Amil baba in Saudi ...
Famous Kala Jadu, Kala ilam specialist in USA and Bangali Amil baba in Saudi ...Famous Kala Jadu, Kala ilam specialist in USA and Bangali Amil baba in Saudi ...
Famous Kala Jadu, Kala ilam specialist in USA and Bangali Amil baba in Saudi ...mazhshah570
 
Responsible Finance Principles and Implication
Responsible Finance Principles and ImplicationResponsible Finance Principles and Implication
Responsible Finance Principles and ImplicationNghiaPham100
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator OptionsVince Stanzione
 
劳伦森大学毕业证
劳伦森大学毕业证劳伦森大学毕业证
劳伦森大学毕业证yyawb
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfHenry Tapper
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationAdnet Communications
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechFinland
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...batoole333
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumFinTech Belgium
 
FE Credit and SMBC Acquisition Case Studies
FE Credit and SMBC Acquisition Case StudiesFE Credit and SMBC Acquisition Case Studies
FE Credit and SMBC Acquisition Case StudiesNghiaPham100
 

Dernier (20)

In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
 
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
 
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdfSeeman_Fiintouch_LLP_Newsletter_May-2024.pdf
Seeman_Fiintouch_LLP_Newsletter_May-2024.pdf
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
Black magic specialist in Canada (Kala ilam specialist in UK) Bangali Amil ba...
Black magic specialist in Canada (Kala ilam specialist in UK) Bangali Amil ba...Black magic specialist in Canada (Kala ilam specialist in UK) Bangali Amil ba...
Black magic specialist in Canada (Kala ilam specialist in UK) Bangali Amil ba...
 
Famous Kala Jadu, Kala ilam specialist in USA and Bangali Amil baba in Saudi ...
Famous Kala Jadu, Kala ilam specialist in USA and Bangali Amil baba in Saudi ...Famous Kala Jadu, Kala ilam specialist in USA and Bangali Amil baba in Saudi ...
Famous Kala Jadu, Kala ilam specialist in USA and Bangali Amil baba in Saudi ...
 
Responsible Finance Principles and Implication
Responsible Finance Principles and ImplicationResponsible Finance Principles and Implication
Responsible Finance Principles and Implication
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
劳伦森大学毕业证
劳伦森大学毕业证劳伦森大学毕业证
劳伦森大学毕业证
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
FE Credit and SMBC Acquisition Case Studies
FE Credit and SMBC Acquisition Case StudiesFE Credit and SMBC Acquisition Case Studies
FE Credit and SMBC Acquisition Case Studies
 

2015 Global Threat Intelligence Report

  • 1. 2015 Global Threat Intelligence Report An analysis of security trends in the Financial Services industry • over 6 billion attacks • trillions of logs • over 18,000 clients • 28% Financial Services industry respondents Data gathered from NTT security companies and NTT’s live Global Threat Intelligence Platform 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world Attack analysis Attack sources US 56% China 9% France 2% India 1.5% Germany 2% Netherlands 2% Denmark 1.1% Russia 2% Ukraine 1.3% Canada 0.9% Australia 9% Rest 9% UK 3% Attacks by sector • Finance sector still #1 target with 18% of all detected attacks Finance 0% 2% 4% 8% 10% 12% 14% 16% 18% 6% Business &professional Manufacturing Retail Healthcare Technology Education Government Pharmaceuticals Insurance Transport& distribution Gaming Media Hospitality,leisure &entertainment Non-profit Other • However, this is a slight decrease of 2% from the previous year Attacks and incident response • Reconnaissance activity from 4% to 10% • Crafted attacks on targeted victims more common Other 5% Known Bad Source 3% Evasion Attempts 3% DoS / DDoS 5% Application Specific Attack 7% Reconaissance 10% Anomalous Activity 20% Network Manipulation 18% Web Application Attack 15% Service Specific Attack 14% Attacks by type 6% 32%of all Malware attacks are in the Financial Services sector Malware attacks have reduced 2% year-on-year in this sector The Financial Services sector has one of the lowest Malware attack rates. of Incident Response Engagements came from the Financial Services industry. The sector’s sensitivity to attacks has driven the prevalence of formal incident response processes and procedures. The sector’s response rate is twice that of the next most active sector, Business Services (16%)
  • 2. dimensiondata.com/globalthreatreport #GlobalThreatReport Threat intelligence defined 2. Raw information collected based on requirements 3. Information processed exploited 4. Intelligence analysis production 1.Consumer needs, planning, requirements direction 5. Dissemination of product to consumer Attacks have shifted from application to user 7 / 10 vulnerabilities relate to end-user systems Users connected to public network using personal, and often more vulnerable devices End-user exploits spike after weekends / holidays when users reconnect End-user systems often have unpatched vulnerabilities • 76% of vulnerabilities + 2 years old • 9% of those +10 years old The user is the perimeter 7/10 Vulnerabilities targeted in exploit kits Cybercrime is $$ $ $$ $Software exploit kits sold in hacking forums hackers take advantage of unpatched flaws install malicious software on vulnerable devices Increased focus on Adobe Flash since security on Java and Internet Explorer improved in 2014. Java Adobe Acrobat Internet Explorer Adobe Flash Firefox Windows Silverlight Others 2013 2014 110 100 90 80 70 60 50 40 30 20 10 0 Changing profile of cybercriminals Organised crime groups with considerable resources and expertise Attacks motivated by: • profit • botnet infrastructure • extortion • fame/notoriety • hacktivism Incident response threat intelligence • Incident response capabilities maturing at a slow pace. • 74% of organisations have no formal incident response plan. Average incident response time Organisations with no vulnerability management programme take nearly 200 days to patch vulnerabilities with CVSS score of 4.0 or more The threat intelligence cycle Our approach to successful threat intelligence helps numerous enterprises stay protected