© 2016 Unisys Corporation. All rights reserved. 2
NO LOCALE, INDUSTRY,
OR ORGANIZATION IS
BULLETPROOF WHEN IT
COMES TO COM...
© 2016 Unisys Corporation. All rights reserved. 3
Consider Hetch Hetchy
© 2016 Unisys Corporation. All rights reserved. 4
Drinking water for 2.6 million
commercial, residential, and
industrial c...
© 2016 Unisys Corporation. All rights reserved. 5
The outline prepared by the creative team of an advertising agency
for t...
© 2016 Unisys Corporation. All rights reserved. 6
From
Harmless…
© 2016 Unisys Corporation. All rights reserved. 7
The outline prepared by the creative team of an advertising agency
for t...
© 2016 Unisys Corporation. All rights reserved. 8
The outline prepared by the creative team of an advertising agency
for t...
© 2016 Unisys Corporation. All rights reserved. 9
The outline prepared by the creative team of an advertising agency
for t...
© 2016 Unisys Corporation. All rights reserved. 10
THE FACE OF HACKING
HAS CHANGED
• Meet Commander X
• Responsible for 20...
© 2016 Unisys Corporation. All rights reserved. 11
• Emotionally Charged
• Aging Infrastructure
• Elevated Profile
• Techn...
© 2016 Unisys Corporation. All rights reserved. 12
~VERIZON DATA BREACH INVESTICATIONS REPORT
5 Seismic Shifts
In Cybersec...
© 2016 Unisys Corporation. All rights reserved. 13
1Killing the
Password:
Access
Shifts
This option has a
triangle on the
...
© 2016 Unisys Corporation. All rights reserved. 14
25%USERS WHO WOULD SELL
THEIR ENTERPRISE
USERNAME AND PASSWORD
~SAILPOI...
© 2016 Unisys Corporation. All rights reserved. 15
Biometrics help but are not foolproof
© 2016 Unisys Corporation. All rights reserved. 16
2Big Data,
Analytics,
and AI, Oh
My!
This option has a
triangle on the
...
© 2016 Unisys Corporation. All rights reserved. 17
84%
FASTER DETECTION & RESPONSE
Less than 24
hours to
compromise a
netw...
© 2016 Unisys Corporation. All rights reserved. 18
Entrepreneurial activities
differ substantially
depending on the type o...
© 2016 Unisys Corporation. All rights reserved. 19
ATTACKERS EXPLOIT
INCONSISTENT SECURITY
POLICIES...THAT HAVE RESULTED
I...
© 2016 Unisys Corporation. All rights reserved. 20
4
House to
Hotel:
Rethinking
Perimeter
Security
© 2016 Unisys Corporation. All rights reserved. 21
30%
PHISHING/”WHALING”
Phishing messages
were opened by the
target
Thos...
© 2016 Unisys Corporation. All rights reserved. 22
IN AN OPEN, INTERNAL
NETWORK ALL IT TAKES
IS ONE
~VERIZON DATA BREACH I...
© 2016 Unisys Corporation. All rights reserved. 23
5Cyber
Workforce
Development
© 2016 Unisys Corporation. All rights reserved. 24
28% OF ORGANIZATIONS
CLAIMED TO HAVE A
PROBLEMATIC SHORTAGE
OF CYBERSEC...
© 2016 Unisys Corporation. All rights reserved. 25
Resource List
www.unisyssecurity.com
Blogs/Websites:
www.Krebsonsecurit...
© 2016 Unisys Corporation. All rights reserved. 26
Remember Hetch Hetchy
© 2016 Unisys Corporation. All rights reserved. 27
THANK YOU
Scott Spiker
Email: scott.spiker@unisys.com
@scottspiker
/sco...
CA Technology Forum 2016 presentation - The Future of Cybersecurity_Scott Spiker
Prochain SlideShare
Chargement dans…5
×

CA Technology Forum 2016 presentation - The Future of Cybersecurity_Scott Spiker

216 vues

Publié le

CA Technology Forum 2016 presentation -
The Future of Cybersecurity
by Scott Spiker

  • Soyez le premier à commenter

  • Soyez le premier à aimer ceci

CA Technology Forum 2016 presentation - The Future of Cybersecurity_Scott Spiker

  1. 1. © 2016 Unisys Corporation. All rights reserved. 2 NO LOCALE, INDUSTRY, OR ORGANIZATION IS BULLETPROOF WHEN IT COMES TO COMPROMISE OF DATA ~VERIZON DATA BREACH INVESTICATIONS REPORT
  2. 2. © 2016 Unisys Corporation. All rights reserved. 3 Consider Hetch Hetchy
  3. 3. © 2016 Unisys Corporation. All rights reserved. 4 Drinking water for 2.6 million commercial, residential, and industrial customers per day Provides 1.7 billion KwH per year
  4. 4. © 2016 Unisys Corporation. All rights reserved. 5 The outline prepared by the creative team of an advertising agency for the launching of an advertising campaign or message. The creative strategy generally explains how the advertising campaign will meet the advertising objectives of the business. Title here But not without controversy…
  5. 5. © 2016 Unisys Corporation. All rights reserved. 6 From Harmless…
  6. 6. © 2016 Unisys Corporation. All rights reserved. 7 The outline prepared by the creative team of an advertising agency for the launching of an advertising campaign or message. The creative strategy generally explains how the advertising campaign will meet the advertising objectives of the business. Title here …to Potentially Catastrophic.
  7. 7. © 2016 Unisys Corporation. All rights reserved. 8 The outline prepared by the creative team of an advertising agency for the launching of an advertising campaign or message. The creative strategy generally explains how the advertising campaign will meet the advertising objectives of the business. Title here Precedent has been set
  8. 8. © 2016 Unisys Corporation. All rights reserved. 9 The outline prepared by the creative team of an advertising agency for the launching of an advertising campaign or message. The creative strategy generally explains how the advertising campaign will meet the advertising objectives of the business. Title here Hacker used “Google-dorking”
  9. 9. © 2016 Unisys Corporation. All rights reserved. 10 THE FACE OF HACKING HAS CHANGED • Meet Commander X • Responsible for 2010 disruption of Santa Cruz County website • Also aided in Arab Spring, Occupy Wall Street and Orlando city website disruption
  10. 10. © 2016 Unisys Corporation. All rights reserved. 11 • Emotionally Charged • Aging Infrastructure • Elevated Profile • Technology Enabled Attacker Anatomy of a Hacktivist Target
  11. 11. © 2016 Unisys Corporation. All rights reserved. 12 ~VERIZON DATA BREACH INVESTICATIONS REPORT 5 Seismic Shifts In Cybersecurity
  12. 12. © 2016 Unisys Corporation. All rights reserved. 13 1Killing the Password: Access Shifts This option has a triangle on the upper left. Throughout the design, we use subtle color shifts to add visual interest and convey forward momentum. TITLE HERE
  13. 13. © 2016 Unisys Corporation. All rights reserved. 14 25%USERS WHO WOULD SELL THEIR ENTERPRISE USERNAME AND PASSWORD ~SAILPOINT MARKETPULSE SURVEY
  14. 14. © 2016 Unisys Corporation. All rights reserved. 15 Biometrics help but are not foolproof
  15. 15. © 2016 Unisys Corporation. All rights reserved. 16 2Big Data, Analytics, and AI, Oh My! This option has a triangle on the upper left. Throughout the design, we use subtle color shifts to add visual interest and convey forward momentum. TITLE HERE
  16. 16. © 2016 Unisys Corporation. All rights reserved. 17 84% FASTER DETECTION & RESPONSE Less than 24 hours to compromise a network But is detected less than 24 hours only 25%~VERIZON DATA BREACH INVESTICATIONS REPORT
  17. 17. © 2016 Unisys Corporation. All rights reserved. 18 Entrepreneurial activities differ substantially depending on the type of T I T L E H E R E Entrepreneurial activities differ substantially depending on the type of T I T L E H E R E 3Reaching Across The Table: The Importance of Partnerships
  18. 18. © 2016 Unisys Corporation. All rights reserved. 19 ATTACKERS EXPLOIT INCONSISTENT SECURITY POLICIES...THAT HAVE RESULTED IN SYSTEMS THAT ARE DIFFICULT TO ADMINISTER AND DEFEND ~MICROSOFT CYBERSPACE 2025
  19. 19. © 2016 Unisys Corporation. All rights reserved. 20 4 House to Hotel: Rethinking Perimeter Security
  20. 20. © 2016 Unisys Corporation. All rights reserved. 21 30% PHISHING/”WHALING” Phishing messages were opened by the target Those that went on to click the link 12%~VERIZON DATA BREACH INVESTICATIONS REPORT
  21. 21. © 2016 Unisys Corporation. All rights reserved. 22 IN AN OPEN, INTERNAL NETWORK ALL IT TAKES IS ONE ~VERIZON DATA BREACH INVESTIGATIONS REPORT
  22. 22. © 2016 Unisys Corporation. All rights reserved. 23 5Cyber Workforce Development
  23. 23. © 2016 Unisys Corporation. All rights reserved. 24 28% OF ORGANIZATIONS CLAIMED TO HAVE A PROBLEMATIC SHORTAGE OF CYBERSECURITY SKILLS ~ESG BRIEF - CYBERSECURITY SKILLS SHORTAGE
  24. 24. © 2016 Unisys Corporation. All rights reserved. 25 Resource List www.unisyssecurity.com Blogs/Websites: www.Krebsonsecurity.com www.darkreading.com www.threatpost.com http://drericcole.blogspot.com/ https://cloudsecurityalliance.org/ https://twofactorauth.org/ Deeper Learning: Verizon Data Breach Investigation Report - http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ AT&T Decoding the Adversary - https://www.business.att.com/content/src/csi/decodingtheadversary.pdf Symantec Internet Security Threat Report - https://www.symantec.com/security-center/threat-report Cisco Security Report - http://www.cisco.com/c/en/us/products/security/annual_security_report.html HP IoT Security Report - http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA5-4759ENW.pdf Books Documentaries
  25. 25. © 2016 Unisys Corporation. All rights reserved. 26 Remember Hetch Hetchy
  26. 26. © 2016 Unisys Corporation. All rights reserved. 27 THANK YOU Scott Spiker Email: scott.spiker@unisys.com @scottspiker /scottspiker

×