SlideShare une entreprise Scribd logo
1  sur  34
„Today’s Top IT Security trends“



Dalibor Ratković - Head of ICT departments
Hvala Vam na pažnji!
             OSVRT O ČEMU SMO PRIČALI 2011




                                  www.telegroup‐ltd.com
Hvala Vam na pažnji!
             OSVRT O ČEMU SMO PRIČALI 2011




                                  www.telegroup‐ltd.com
Hvala Vam na pažnji!
             OSVRT O ČEMU SMO PRIČALI 2011




                                  www.telegroup‐ltd.com
2012 – Žašto je Security tržište toliko dinamičnoa
Izvor informacija
Šta se dešavalo u 2012 - Flame worm
Flame malware - The biggest? The baddest? Costs over 100 M$


Once a system is infected, Flame begins a
complex set of operations, including sniffing the
network traffic, taking screenshots, recording
audio conversations, intercepting the keyboard,
and so on. All this data is available to the
operators through the link to Flame’s
command-and-control servers. 20 MB Maj 2012
Flame worm
Šta se dešavalo u 2012 – Gauss Trojan

State-sponsored Trojan 'Gauss' targets Lebanese banks and user details


 Named ‘Gauss', it claimed that
 this is a complex, nation-state
 sponsored cyber espionage
 toolkit and its online banking
 Trojan functionality has not been
 found in any previously known
 cyber weapons. Avg 2012
Šta se dešavalo u 2012 – Mini Flame


MiniFlame is different from Flame
and Gauss in that the number of
infections is significantly smaller.
While we estimate the total number
of Flame/Gauss victims at no less
than 10,000 systems, MiniFlame has
been detected in just a few dozen
systems in Western Asia. 16.
October
Obama, Romney avoid talking cyber security at
debate
Did Chinese hackers access the White House's
nuclear secrets?

 Failure of the Obama administration to press China on its 
 persistent cyber attacks.
 The official said: “In this instance the attack was identified, 
 the system was isolated, and there is no indication 
 whatsoever that any exfiltration of data took place.”
Šta se dešavalo u 2012

  SCADA-based water system hacked in USA
• 21.11.2011 Reports emerged at the end of last
  week that a SCADA-based water system in the
  US had been hacked.
• Blog posts confirm that "there was damage – the
  SCADA system was powered on and off, burning
  out a water pump".
• Location - in Springfield, Illinois
Šta se dešavalo u 2012 - Conficker worm is still
actively infecting users

Microsoft announced a $250,000 reward for information that
resulted in the arrest and conviction of those responsible for the
Conficker malware in 2009

Conficker worm first appeared on 21st November 2008
Šta se dešavalo u 2012
  More malware found hosted in Google's official Android 
  market
Android.Dropdialer, a trojan that racks up costly charges from 
forced calls made to premium phone numbers
ŠTA ĆE BITI OBAVEZA IT MENADŽERA U
        NAREDNOM PERIODU
Takeaways for 2012 and 2013




                              www.awesomebackgrounds.com
Bring Your Own Device!
BYOD definitions
 BYOD is short for bring your own device.
 Bring Your Own Device (BYOD) describes the recent trend of 
 employees bringing personally‐owned mobile devices, such 
 as smartphones, laptops and PDAs, to their place of work, 
 and using those devices to access privileged company 
 resources such as email, file servers, and database
Bring Your Own Device - BYOD
 always‐on, always‐connected gives way to "hyperconneted„
 Mobile malware is on the rise ‐ Malware targeting mobile 
 devices will continue to increase, and enterprises will wrestle 
 with how to protect users. Obvious targets will be 
 smartphones and tablets.
 By 2018, 70% of mobile professionals will conduct all of their 
 work on personal smart devices. 
Hyper-connectivity leads to growing identity and
privacy challenges
 In today’s business 
 environment, more users 
 need to legitimately access 
 more data from more places.
 The IAM Market Evolution to 
 Cloud Computing  ‐ By the 
 end of 2014, IDaaS will 
 account for 25% of all new 
 IAM sales, compared with less 
 than 5% in 2012. 
New concerns will surface about IPv6
  In future, many operations 
 will start migrating to these 
 newer versions, generating a 
 new round of vulnerabilities 
 and exploits.
 In addition, the other two 
 fundamental mechanisms of 
 the Internet ‐‐ border 
 gateway protocol and domain 
 name system (DNS)  ‐‐ also 
 now offer a next‐generation 
 version.
Information Security Risk Assessment
This risk management will 
explore each phase of the IT 
security risk management 
lifecycle, focusing on techniques 
that should be used to properly 
identify, articulate, assess, 
mitigate, and report on 
information risk.
Big Data will get bigger, and so will security needs
Securing Public/Private Cloud
Izgled novog modernog sistema zaštite
The challenge is to spend money wisely
Security Partneri
Telegroup Partners:
Te
Security Partneri
Partners:
www.telegroup.ba
                       www.telegroup-ltd.com




                                       www.telegroup-bg.com




HVALA VAM NA PAŽNJI!

Contenu connexe

Tendances

Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 

Tendances (19)

New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Software piracy
Software piracySoftware piracy
Software piracy
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Latin America’s Internet Usage Increases
Latin America’s Internet Usage IncreasesLatin America’s Internet Usage Increases
Latin America’s Internet Usage Increases
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 

En vedette (9)

музей
музеймузей
музей
 
UA - analiZatoR - услуги Google Analytics
UA - analiZatoR - услуги Google AnalyticsUA - analiZatoR - услуги Google Analytics
UA - analiZatoR - услуги Google Analytics
 
Ua-analiZatoR (бесплатный пакет) СТАРТ
Ua-analiZatoR (бесплатный пакет) СТАРТUa-analiZatoR (бесплатный пакет) СТАРТ
Ua-analiZatoR (бесплатный пакет) СТАРТ
 
La taula rodona
La taula rodonaLa taula rodona
La taula rodona
 
Alexy1
Alexy1Alexy1
Alexy1
 
Diversity Committee Brochure designed by Keith Chrisman
Diversity Committee Brochure designed by Keith ChrismanDiversity Committee Brochure designed by Keith Chrisman
Diversity Committee Brochure designed by Keith Chrisman
 
Review + Assess: Luke Havergal, Richard Cory, Richard Bone
Review + Assess: Luke Havergal, Richard Cory, Richard BoneReview + Assess: Luke Havergal, Richard Cory, Richard Bone
Review + Assess: Luke Havergal, Richard Cory, Richard Bone
 
Richard Bone
Richard BoneRichard Bone
Richard Bone
 
SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015
 

Similaire à Infosecurity 2012 Banja Luka

Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
Kim Jensen
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 

Similaire à Infosecurity 2012 Banja Luka (20)

Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Infosecurity 2012 Banja Luka

  • 1.
  • 2. „Today’s Top IT Security trends“ Dalibor Ratković - Head of ICT departments
  • 3. Hvala Vam na pažnji! OSVRT O ČEMU SMO PRIČALI 2011 www.telegroup‐ltd.com
  • 4. Hvala Vam na pažnji! OSVRT O ČEMU SMO PRIČALI 2011 www.telegroup‐ltd.com
  • 5. Hvala Vam na pažnji! OSVRT O ČEMU SMO PRIČALI 2011 www.telegroup‐ltd.com
  • 6. 2012 – Žašto je Security tržište toliko dinamičnoa
  • 8. Šta se dešavalo u 2012 - Flame worm Flame malware - The biggest? The baddest? Costs over 100 M$ Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations, intercepting the keyboard, and so on. All this data is available to the operators through the link to Flame’s command-and-control servers. 20 MB Maj 2012
  • 10. Šta se dešavalo u 2012 – Gauss Trojan State-sponsored Trojan 'Gauss' targets Lebanese banks and user details Named ‘Gauss', it claimed that this is a complex, nation-state sponsored cyber espionage toolkit and its online banking Trojan functionality has not been found in any previously known cyber weapons. Avg 2012
  • 11. Šta se dešavalo u 2012 – Mini Flame MiniFlame is different from Flame and Gauss in that the number of infections is significantly smaller. While we estimate the total number of Flame/Gauss victims at no less than 10,000 systems, MiniFlame has been detected in just a few dozen systems in Western Asia. 16. October
  • 12. Obama, Romney avoid talking cyber security at debate
  • 13. Did Chinese hackers access the White House's nuclear secrets? Failure of the Obama administration to press China on its  persistent cyber attacks. The official said: “In this instance the attack was identified,  the system was isolated, and there is no indication  whatsoever that any exfiltration of data took place.”
  • 14. Šta se dešavalo u 2012 SCADA-based water system hacked in USA • 21.11.2011 Reports emerged at the end of last week that a SCADA-based water system in the US had been hacked. • Blog posts confirm that "there was damage – the SCADA system was powered on and off, burning out a water pump". • Location - in Springfield, Illinois
  • 15. Šta se dešavalo u 2012 - Conficker worm is still actively infecting users Microsoft announced a $250,000 reward for information that resulted in the arrest and conviction of those responsible for the Conficker malware in 2009 Conficker worm first appeared on 21st November 2008
  • 16. Šta se dešavalo u 2012 More malware found hosted in Google's official Android  market Android.Dropdialer, a trojan that racks up costly charges from  forced calls made to premium phone numbers
  • 17. ŠTA ĆE BITI OBAVEZA IT MENADŽERA U NAREDNOM PERIODU
  • 18. Takeaways for 2012 and 2013 www.awesomebackgrounds.com
  • 19. Bring Your Own Device!
  • 20. BYOD definitions BYOD is short for bring your own device. Bring Your Own Device (BYOD) describes the recent trend of  employees bringing personally‐owned mobile devices, such  as smartphones, laptops and PDAs, to their place of work,  and using those devices to access privileged company  resources such as email, file servers, and database
  • 21. Bring Your Own Device - BYOD always‐on, always‐connected gives way to "hyperconneted„ Mobile malware is on the rise ‐ Malware targeting mobile  devices will continue to increase, and enterprises will wrestle  with how to protect users. Obvious targets will be  smartphones and tablets. By 2018, 70% of mobile professionals will conduct all of their  work on personal smart devices. 
  • 22.
  • 23. Hyper-connectivity leads to growing identity and privacy challenges In today’s business  environment, more users  need to legitimately access  more data from more places. The IAM Market Evolution to  Cloud Computing  ‐ By the  end of 2014, IDaaS will  account for 25% of all new  IAM sales, compared with less  than 5% in 2012. 
  • 24. New concerns will surface about IPv6 In future, many operations  will start migrating to these  newer versions, generating a  new round of vulnerabilities  and exploits. In addition, the other two  fundamental mechanisms of  the Internet ‐‐ border  gateway protocol and domain  name system (DNS)  ‐‐ also  now offer a next‐generation  version.
  • 25. Information Security Risk Assessment This risk management will  explore each phase of the IT  security risk management  lifecycle, focusing on techniques  that should be used to properly  identify, articulate, assess,  mitigate, and report on  information risk.
  • 26. Big Data will get bigger, and so will security needs
  • 28. Izgled novog modernog sistema zaštite
  • 29.
  • 30. The challenge is to spend money wisely
  • 33.
  • 34. www.telegroup.ba www.telegroup-ltd.com www.telegroup-bg.com HVALA VAM NA PAŽNJI!