Emerging Trends in ManagingIT SecurityMay 2012Presentation by: Khalid Shaikh – Practice Head forIT Security and Privacy Se...
Changing Business Needs                                          1980                                                     ...
Emerging Technologies3   © 2012 Protiviti Member Firm Kuwait W.L.L    PUBLIC: 4th Kuwait Info Security Conference
Trends in IT Security Attack    TREND 1 : Industrial Threats    TREND 2 : Threats Within: Embedded Hardware    TREND 3 : H...
Recent Events5   © 2012 Protiviti Member Firm Kuwait W.L.L    PUBLIC: 4th Kuwait Info Security Conference
Motives of Attack    •    Industrial Espionage    •    Financial    •    Military    •    Ideological    •    Politics    ...
Attack Tools are Freely Available7    © 2012 Protiviti Member Firm Kuwait W.L.L     PUBLIC: 4th Kuwait Info Security Confe...
Security Never Sleeps    • Increasing sophistications of attacks    • Protect data and information    • Keeping up-to-date...
Holistic Approach in Managing IT Security                                                                                 ...
Holistic Approach in Managing IT Security10    © 2012 Protiviti Member Firm Kuwait W.L.L      PUBLIC: 4th Kuwait Info Secu...
Prediction – Persistence – Patience - Preparedness11   © 2012 Protiviti Member Firm Kuwait W.L.L     PUBLIC: 4th Kuwait In...
If You Have Further Questions: Please visit us     at Booth Number 8 and 9.       Khalid Shaikh                           ...
13   © 2012 Protiviti Member Firm Kuwait W.L.L     PUBLIC: 4th Kuwait Info Security Conference
Prochain SlideShare
Chargement dans…5
×

Mr. Khalid Shaikh - emerging trends in managing it security

646 vues

Publié le

Publié dans : Technologie, Business
0 commentaire
1 j’aime
Statistiques
Remarques
  • Soyez le premier à commenter

Aucun téléchargement
Vues
Nombre de vues
646
Sur SlideShare
0
Issues des intégrations
0
Intégrations
2
Actions
Partages
0
Téléchargements
9
Commentaires
0
J’aime
1
Intégrations 0
Aucune incorporation

Aucune remarque pour cette diapositive

Mr. Khalid Shaikh - emerging trends in managing it security

  1. 1. Emerging Trends in ManagingIT SecurityMay 2012Presentation by: Khalid Shaikh – Practice Head forIT Security and Privacy Services
  2. 2. Changing Business Needs 1980 2000 2010 and beyond Internet Public Telephone Evolution Transformation Digital Set Top Customers Telephone, Third Telephone, Internet Third Internet Parties & Third Parties Parties & Third Parties Internet Third Internet Router Router Satellite dish Parties Lightpath ` ` Internet Internet Satellite dish Satellite dish Frame Optimum Cable Modem Relay Online Customers Optimum Oracle Online Optimum Untrusted Lightpath Corporate Cable Modem Corporate Cable Modem Customers Online Backbone Customers Backbone Customers Backbone Other Businesses and/or New Businesses Voice Voice Network Satellite dish Network Satellite dish Router Router Cable Frame Internet Relay Terminal Server PBX PBX Rainbow Media Lightpath Lightpath Digital Digital Set Top Set Top Customers Internet Employees & Customers Customers Third Parties Lightpath Public Satellite dish Lightpath Public Customers Telephone Customers Telephone2 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  3. 3. Emerging Technologies3 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  4. 4. Trends in IT Security Attack TREND 1 : Industrial Threats TREND 2 : Threats Within: Embedded Hardware TREND 3 : Hacktivism TREND 4 : Web Threats…. TREND 5 : Mobile Threats4 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  5. 5. Recent Events5 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  6. 6. Motives of Attack • Industrial Espionage • Financial • Military • Ideological • Politics • Prestige6 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  7. 7. Attack Tools are Freely Available7 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  8. 8. Security Never Sleeps • Increasing sophistications of attacks • Protect data and information • Keeping up-to-date with security incidents and solutions • Keeping the IT infrastructure in compliance with the IT Security Policy of the organization • Keeping up-to-date with the changes to legal and regulatory requirements • Reacting effectively and timely to security violations • Effectively managing threats to data security • Complexity of managing a broad portfolio of security tools/solutions • Mobile clients and unmanaged devices • Periodically conducting security awareness trainings to users within the organization8 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  9. 9. Holistic Approach in Managing IT Security Information Security Vision and Strategy Business Initiatives Threats Senior Management Commitment Best/Acceptable Practice Training and Awareness Enterprise Architecture Legislation Strategy Vulnerability & Risk Assessment Security Policy Security Architecture and Technical Standards Administrative and End-User Guidelines, Practices and Procedures Enforcement Monitoring Recovery Process Process Process Information Security Management9 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  10. 10. Holistic Approach in Managing IT Security10 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  11. 11. Prediction – Persistence – Patience - Preparedness11 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  12. 12. If You Have Further Questions: Please visit us at Booth Number 8 and 9. Khalid Shaikh Phone: (965) – 66225122 Senior Manager – Technology khalid.shaikh@protivitiglobal.com.kw Risk Services Powerful Insights. Proven Delivery.™12 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
  13. 13. 13 © 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference

×