SlideShare une entreprise Scribd logo
1  sur  58
Télécharger pour lire hors ligne
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 1
Hadi Nahari, Chief Security Architect, NVIDIA
Varun Kohli, Vice President, Skycure
September, 2015
MOBILE SECURITY & ANALYTICS: WHAT
WORKS & WHAT DOESN'T
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 2
Meet$Your$Speakers$
Hadi$Nahari$
Chief$Security$Architect,$$
Mobile$and$So<ware$Pla?orms$
NVIDIA$
Varun$Kohli$
VP$of$MarkeEng$
Skycure$
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 3
Quick$Housekeeping$
•  Q&A$panel$is$available$if$you$have$any$quesEons$
•  There$will$be$Eme$for$Q&A$at$the$end$$
•  We$are$recording$this$webinar$for$future$viewing$
•  All$aMendees$will$receive$a$copy$of$slides/recording$
Join$the$discussion$using$#mobilethreatdefense$hashtag$on$TwiMer$$
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
2'
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
3'
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
4'
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
5'
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
6'
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
7'
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
8'
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
9'
Security:'Easy'to'Get'Wrong'
COPYRIGHT'2015,'Hadi'Nahari'
10'
>3,000,000,000,000''
'threats'annually''''
''''''''''''''''''50%' 25%'25%'
legacy'threats'
blocked'
advanced'threats'
'''detected''''''''undetected'
1.6'B'
'number'of'records'lost'globally'in'2014'
$236'M'
recovery'cost'of'Target'breach'(so'far)'
$110$BN$
annual'price'tag'
of'cybercrime'
(avg.'$27.3'loss'per'incident)'
15'B'
connected'devices'in'2015'
General'Threat'Landscape'
11'COPYRIGHT'2015,'Hadi'Nahari'
Mo2va2on'
•  More'connected'devices'!'more'value'!'added'risk'
•  Security'posture'hasn’t'magically'just'improved'
–  In'many'cases'in'fact'it'has'regressed'
•  Heterogeneous'security'paradigms'
–  Device_end'data'is'processed'out'of'band'
–  Dubious'infrastructure'security'posture'
12'COPYRIGHT'2015,'Hadi'Nahari'
Increasing'Complexity'
13'
•  Space'Shuale:'~400K'LOC'
COPYRIGHT'2015,'Hadi'Nahari'
Increasing'Complexity'
14'
•  F22'Raptor'fighter:'~2M'LOC'
COPYRIGHT'2015,'Hadi'Nahari'
Increasing'Complexity'
15'
•  Linux'kernel'2.2:'~2.5M'LOC'
COPYRIGHT'2015,'Hadi'Nahari'
Increasing'Complexity'
16'
•  Hubble'telescope:'~3M'LOC'
COPYRIGHT'2015,'Hadi'Nahari'
Increasing'Complexity'
17'
•  Android'core:'~12M'LOC'
COPYRIGHT'2015,'Hadi'Nahari'
Increasing'Complexity'
18'
•  Future'Combat'Sys.:'~63M'LOC'
COPYRIGHT'2015,'Hadi'Nahari'
Increasing'Complexity'
19'
•  Connected'car:'~100M'LOC'
COPYRIGHT'2015,'Hadi'Nahari'
Increasing'Complexity'
20'
•  Autonomous'vehicle:'~300M'LOC'
COPYRIGHT'2015,'Hadi'Nahari'
Internet'of'Things'(IoT)'
21'
•  Controllers,'processors,'
CPUs.'No'standard'comm.'
COPYRIGHT'2015,'Hadi'Nahari'
Internet'of'Things'(IoT)'
22'
''
'
•  ~standard'comm.'stack(s):'s2ll'a''
mix'(WiFi,'BT,'NFC,'ZigBee,'etc.)'
COPYRIGHT'2015,'Hadi'Nahari'
Internet'of'Things'(IoT)'
23'
''
'
'
'
•  Apps'and'ecosystem'
COPYRIGHT'2015,'Hadi'Nahari'
Internet'of'Things'(IoT)'
24'
'
'
•  Transi2on'to'services'
COPYRIGHT'2015,'Hadi'Nahari'
Internet'of'Things'(IoT)'
25'
•  Scaled_up'connec2on'
!'mass'data'genera2on'
COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
26'
•  Basic'connec2vity'
COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
27'
•  Autonomous'driving'
(connec2vity!'+data)'
COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
28'
•  V2V(++data)'
COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
29'
•  V2I'(+++data)'
COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
•  Can'they'be'hacked?'
30'COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
•  Concept'hacks'
31'COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
•  Drivetrain'exploits'
32'COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
•  No2ce'the'speed'and'gear''
posi2on??'
33'COPYRIGHT'2015,'Hadi'Nahari'
Connected'Vehicle'
•  Infrastructure'
!'VPN'to'backend'
!'1_N'exploits'
34'COPYRIGHT'2015,'Hadi'Nahari'
35'
Big'Data'&'Infrastructure'
COPYRIGHT'2015,'Hadi'Nahari'
“Big'Data'is'like'teenage'sex:'
''everyone'talks'about'it,'
''nobody'really'knows'how'to'do'it,'
''everyone'thinks'everyone'else'is'doing'it,'
''so'everyone'claims'they'are'doing'it…”'
' ' '–Dan%Ariely,%Duke%University%%
36'
Big'Data'&'Infrastructure'
•  More'connec2vity''
!'more'data''
COPYRIGHT'2015,'Hadi'Nahari'
37'
Big'Data'&'Infrastructure'
'
''
•  It’s'not'just'the'size'
COPYRIGHT'2015,'Hadi'Nahari'
38'
Big'Data'&'Infrastructure'
•  Analy2cs'
COPYRIGHT'2015,'Hadi'Nahari'
39'
Big'Data'&'Infrastructure'
•  Privacy'concerns,''
scalable'hacking'
COPYRIGHT'2015,'Hadi'Nahari'
40'
Big'Data'&'Infrastructure'
•  “…your'call'maybe'monitored''
'''''for'quality'purposes…”'
COPYRIGHT'2015,'Hadi'Nahari'
“On%the%Internet,%nobody%knows%you’re%a%dog.”%–Peter%Steiner%
41'
Pre'IoT/Big'Data'
42'
service provider (SP)
hi, I’m Eva! (eva, password123*)
is there a match?
(eva, password123)
! match: issue a token
! no match: deny access
(if match, respond:) “hi Eva! here’s your token:”
…
observations
(eva,
password123)
×
COPYRIGHT'2015,'Hadi'Nahari'
IoT'/'Big'Data'Era'
43'
service provider
123456
password
12345678
qwerty
abc123
(on avg. only five passwords per 40 online accounts per user)
Where to store token(s)???
COPYRIGHT'2015,'Hadi'Nahari'
Result'
44'
''
%
%
some%noteworthy%breaches%since%this%report%was%released%
COPYRIGHT'2015,'Hadi'Nahari'
Ac2ons'
•  IDENTIFY'the'security%assets'in'your'system'
–  Anything'that'would'be'of'any'value'to'hackers''
•  DEVISE'aaacks'
–  Think'like'a'hacker'
–  Think'of'ways'to'obtain'illegal'access'to'security'assets'
•  PRIORITIZE$
–  Assign'levels'(e.g.'1_5)'to'aaacks'and'assets'
–  High_priority'asset'suscep2ble'to'easy'aaack'gets'higher'priority'
•  PROTECT$
–  Think'of'making'hackers’'life'difficult'
–  Consult'with'security'professionals'
•  ITERATE$
–  Hackers'learn'(and'they’re'good'at'it.)'Security'is'always'work_in_progress'
45'COPYRIGHT'2015,'Hadi'Nahari'
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 16
Ac#ons'(Cont.)'
1.  IDENTIFY the security assets in your system
– Anything that would be of any value to hackers
2.  DEVISE attacks
– Think like a hacker
– Think of ways to obtain illegal access to security assets
3.  PRIORITIZE
– Assign levels (e.g.1-5) to attacks and assets
– High-priority asset susceptible to easy attack gets higher priority
4.  PROTECT
– Think of making hackers’ life difficult – Consult with security
professionals
5.  ITERATE
– Hackers learn (and they’re good at it.) Security is always work-in-
progress
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 17
1.'Iden#fy'
•  Assets + Attacks
•  How many mobile device in your org
experienced a threat in the last month?
-  What types of threats?
-  Where did they come from?
-  Who was attacked the most?
-  What was the impact?
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 18
2.'Devise'A7acks'
•  Have you been breached?
92% of users click on “Continue”
compromising their Exchange identity
(username and password)
Continue
92%
Cancel
8%
Source:'Skycure'Threat'Intelligence'
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 19
3.'Priori#ze'
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 20
4.'Protect'F>'Proac#vely'Protect'
“Waze” of Mobile Security
•  “How do you know if the
network you connect to
is real or fake?”
•  “What about the app you just
downloaded? Free?
Repackaged? Malicious?
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 21
5.'Iterate'
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 22
Skycure'–'Solu#on'Overview'
•  Policy creation and enforcement
•  Reporting and compliance
•  Flexible deployment
•  Enterprise integrations
•  24x7 detection and protection
•  Network, device and app analysis
•  Seamless experience
•  Multi platform – iOS & Android
Employee IT Team
Mobile Threat Intelligence
•  Millions of tests per month
•  500K+ networks and apps analyzed
•  Zero-day threats
•  Predictive Security
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 23
h7ps://maps.skycure.com'
RealFTime'Threat'Intelligence'
100K+'Global'Threats'Iden#fied'in'2014'
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 24
Public'Apps'&'Cloud'Service'
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 25
Summary'
•  Mobile/IOT is a low hanging fruit for attackers
•  Mobile security threat landscape
-  Physical, Network, Malware, Vulnerabilities
•  Recommendations
-  Focus on visibility as a
baseline to security
-  Be proactive. Reactive is often
too little too late
-  Security solutions for
personal and business needs
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 26
Next'Steps'
Request a FREE 30 Day Trial!
sales@skycure.com, Phone: 1-800-650-4821
https://www.skycure.com/trial
https://blog.skycure.com
@hadinahari, @SkycureSecurity, @vk_is
https://www.linkedin.com/company/skycure

Contenu connexe

Tendances

Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewSkybox Security
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureFrom Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureNowSecure
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business InsecuritiesPing Identity
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
 
Hacking A Bluetooth-Enabled Medical Device Is Too Easy
Hacking A Bluetooth-Enabled Medical Device Is Too EasyHacking A Bluetooth-Enabled Medical Device Is Too Easy
Hacking A Bluetooth-Enabled Medical Device Is Too EasyIFAH
 
Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Building secure cloud apps – lessons learned from Microsoft’s internal securi...Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Building secure cloud apps – lessons learned from Microsoft’s internal securi...Microsoft Tech Community
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present DangerPing Identity
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldPing Identity
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
2019 Infosec World Keynote
2019 Infosec World Keynote2019 Infosec World Keynote
2019 Infosec World KeynoteJohn Kinsella
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZscaler
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 

Tendances (20)

Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent View
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference ArchitectureFrom Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
Hacking A Bluetooth-Enabled Medical Device Is Too Easy
Hacking A Bluetooth-Enabled Medical Device Is Too EasyHacking A Bluetooth-Enabled Medical Device Is Too Easy
Hacking A Bluetooth-Enabled Medical Device Is Too Easy
 
Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Building secure cloud apps – lessons learned from Microsoft’s internal securi...Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Building secure cloud apps – lessons learned from Microsoft’s internal securi...
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
2019 Infosec World Keynote
2019 Infosec World Keynote2019 Infosec World Keynote
2019 Infosec World Keynote
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 

En vedette

Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecuritySkycure
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
Top 10 it security architect interview questions and answers
Top 10 it security architect interview questions and answersTop 10 it security architect interview questions and answers
Top 10 it security architect interview questions and answersmikeforbush3
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglyAlgoSec
 
With big data comes big responsibility
With big data comes big responsibilityWith big data comes big responsibility
With big data comes big responsibilityERPScan
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 

En vedette (15)

Tomorrow will be better than today...
Tomorrow will be better than today...Tomorrow will be better than today...
Tomorrow will be better than today...
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 
Networking Technologies : Segmentation
Networking Technologies : Segmentation Networking Technologies : Segmentation
Networking Technologies : Segmentation
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
Top 10 it security architect interview questions and answers
Top 10 it security architect interview questions and answersTop 10 it security architect interview questions and answers
Top 10 it security architect interview questions and answers
 
Masters in Social Work (MSW)
Masters in Social Work (MSW)Masters in Social Work (MSW)
Masters in Social Work (MSW)
 
PACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network SegmentationPACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network Segmentation
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
With big data comes big responsibility
With big data comes big responsibilityWith big data comes big responsibility
With big data comes big responsibility
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 

Similaire à Mobile Security & Analytics: What Works and What Doesn't

Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....CA Technologies
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE - ATT&CKcon
 
DOES14 - Joshua Corman - Sonatype
DOES14 - Joshua Corman - SonatypeDOES14 - Joshua Corman - Sonatype
DOES14 - Joshua Corman - SonatypeGene Kim
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Cyber Week 2020 Preview: Five Days of Special TechSoup Offers
Cyber Week 2020 Preview: Five Days of Special TechSoup Offers Cyber Week 2020 Preview: Five Days of Special TechSoup Offers
Cyber Week 2020 Preview: Five Days of Special TechSoup Offers TechSoup
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021VMware Tanzu
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureSecureAuth
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018Adhitya Hartowo
 

Similaire à Mobile Security & Analytics: What Works and What Doesn't (20)

Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
 
DOES14 - Joshua Corman - Sonatype
DOES14 - Joshua Corman - SonatypeDOES14 - Joshua Corman - Sonatype
DOES14 - Joshua Corman - Sonatype
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 
2014 09-04-pj
2014 09-04-pj2014 09-04-pj
2014 09-04-pj
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Cyber Week 2020 Preview: Five Days of Special TechSoup Offers
Cyber Week 2020 Preview: Five Days of Special TechSoup Offers Cyber Week 2020 Preview: Five Days of Special TechSoup Offers
Cyber Week 2020 Preview: Five Days of Special TechSoup Offers
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
 

Mobile Security & Analytics: What Works and What Doesn't