ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Top Security
                              Threats
                             for 2011
Thursday, March 31, 2011
Presenter

                                Eric Kitchens, CISSP/CISA
                                  eric@thegarlandgroup.net




Thursday, March 31, 2011
riskkey.com




                 ? IT Audit / Security Testing
                 ? Continuous Compliance
                 ? Collaboration Consulting




Thursday, March 31, 2011
What Are The
                           Top Security Threats
                                for 2011?


Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.


                       New and emerging threats often are combinations of ¡°old¡± threats.




Thursday, March 31, 2011
Something Old, Something New,
                              Something Borrowed...
                             Threats that were big news in the past are still out there.


                       New and emerging threats often are combinations of ¡°old¡± threats.


                                         It¡¯s never too late to mitigate.



Thursday, March 31, 2011
Something Old...
                           Threats that have been with us for many years
                              and will be with us for years to come.




Thursday, March 31, 2011
Something Old...
                           Threats that have been with us for many years
                              and will be with us for years to come.


                 ? Mobile Devices




Thursday, March 31, 2011
Something Old...
                            Threats that have been with us for many years
                               and will be with us for years to come.


                 ? Mobile Devices
                  ? Cloud Computing & Virtualization



Thursday, March 31, 2011
Something Old...
                            Threats that have been with us for many years
                               and will be with us for years to come.


                 ? Mobile Devices
                  ? Cloud Computing & Virtualization
                  ? Application Vulnerabilities

Thursday, March 31, 2011
Mobile Devices




Thursday, March 31, 2011
Mobile Devices

           ? Various Platforms




Thursday, March 31, 2011
Mobile Devices

           ? Various Platforms
           ? Mal-Ware in the AppStore




Thursday, March 31, 2011
Mobile Devices

           ? Various Platforms
           ? Mal-Ware in the AppStore
           ? Merging Business & Personal Use



Thursday, March 31, 2011
Mobile Devices

           ? Various Platforms
           ? Mal-Ware in the AppStore
           ? Merging Business & Personal Use
           ? Lost or Stolen Devices & Data

Thursday, March 31, 2011
Cloud Computing




Thursday, March 31, 2011
Cloud Computing

              ? Expanding Scope of Virtualization




Thursday, March 31, 2011
Cloud Computing

              ? Expanding Scope of Virtualization
              ? Outsourced Applications and Services



Thursday, March 31, 2011
Application Vulnerabilities




Thursday, March 31, 2011
Application Vulnerabilities

                  ? Operating System Vulnerabilities are Decreasing




Thursday, March 31, 2011
Application Vulnerabilities

                  ? Operating System Vulnerabilities are Decreasing
                  ? Application Speci?c Vulnerabilities are on the Rise




Thursday, March 31, 2011
Application Vulnerabilities

                  ? Operating System Vulnerabilities are Decreasing
                  ? Application Speci?c Vulnerabilities are on the Rise
                  ? Evaluate Automated Patching Tools for All Applications & Systems



Thursday, March 31, 2011
Something New...
                           Not ¡°new¡± but emerging and evolving into new problems




Thursday, March 31, 2011
Something New...
                           Not ¡°new¡± but emerging and evolving into new problems



              ? Advanced Persistent Threats




Thursday, March 31, 2011
Something New...
                           Not ¡°new¡± but emerging and evolving into new problems



              ? Advanced Persistent Threats
              ? Hacktivisim



Thursday, March 31, 2011
Something New...
                           Not ¡°new¡± but emerging and evolving into new problems



              ? Advanced Persistent Threats
              ? Hacktivisim
              ? Cyberterrorism


Thursday, March 31, 2011
Advanced Persistent Threats




Thursday, March 31, 2011
Advanced Persistent Threats

                  ? Google and RSA Are Recent Examples




Thursday, March 31, 2011
Advanced Persistent Threats

                  ? Google and RSA Are Recent Examples
                  ? Executed Over Extended Period of Time




Thursday, March 31, 2011
Advanced Persistent Threats

                  ? Google and RSA Are Recent Examples
                  ? Executed Over Extended Period of Time
                  ? Adapts to Defenses and Mitigation Strategies



Thursday, March 31, 2011
Advanced Persistent Threats

                  ? Google and RSA Are Recent Examples
                  ? Executed Over Extended Period of Time
                  ? Adapts to Defenses and Mitigation Strategies
                  ? Baselining and Monitoring are Essential for Defense

Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                ? DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                ? DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                ? Disrupting Services for Ideological Purposes




Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                ? DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                ? Disrupting Services for Ideological Purposes
                ? Tools are Freely Available to Non-Technical Users



Thursday, March 31, 2011
Cyber-Terrorism & Hacktivism

                ? DoS of Visa and MasterCard from WikiLeaks Supporters
                       are Prime Examples.

                ? Disrupting Services for Ideological Purposes
                ? Tools are Freely Available to Non-Technical Users
                ? Be Aware of Outsourced Relationships and
                       Higher Risk Customers They Service


Thursday, March 31, 2011
Something Borrowed...




Thursday, March 31, 2011
Something Borrowed...
                       ¡°I swear, I meant to return all the con?dential data on my USB drive
                                          after I was done ¡®borrowing¡¯ it!¡±




Thursday, March 31, 2011
Something Borrowed...
                       ¡°I swear, I meant to return all the con?dential data on my USB drive
                                          after I was done ¡®borrowing¡¯ it!¡±


                       ? Insider Threats




Thursday, March 31, 2011
Something Borrowed...
                       ¡°I swear, I meant to return all the con?dential data on my USB drive
                                          after I was done ¡®borrowing¡¯ it!¡±


                       ? Insider Threats
                       ? Data Classi?cation and Control



Thursday, March 31, 2011
Something Borrowed...
                       ¡°I swear, I meant to return all the con?dential data on my USB drive
                                          after I was done ¡®borrowing¡¯ it!¡±


                       ? Insider Threats
                       ? Data Classi?cation and Control
                       ? USB Storage Devices

Thursday, March 31, 2011
Questions & Answers




Thursday, March 31, 2011
Thanks.
                           Email: eric@thegarlandgroup.net

                           Web: http://www.thegarlandgroup.net




Thursday, March 31, 2011
Ad

Recommended

Competitive advantages of Air Banking
Competitive advantages of Air Banking
Brad Garland
?
Defining Success in your Organization
Defining Success in your Organization
Brad Garland
?
The Business World - You're more ready than you think
The Business World - You're more ready than you think
Brad Garland
?
Organizational Communications Presentation @ UNT
Organizational Communications Presentation @ UNT
Brad Garland
?
¥µ¥¤¥Ð©`·¸×ï?¥µ¥¤¥Ð©`¥¹¥Ñ¥¤»î¶¯¤È¥¢¥¤¥Ç¥ó¥Æ¥£¥Æ¥£³å11-04-2011
¥µ¥¤¥Ð©`·¸×ï?¥µ¥¤¥Ð©`¥¹¥Ñ¥¤»î¶¯¤È¥¢¥¤¥Ç¥ó¥Æ¥£¥Æ¥£³å11-04-2011
Gohsuke Takama
?
Appsec Introduction
Appsec Introduction
Mohamed Ridha CHEBBI, CISSP
?
Protecting the Information Infrastructure
Protecting the Information Infrastructure
Jay McLaughlin
?
Why My E Identity Needs Protection
Why My E Identity Needs Protection
ecarrow
?
Top Application Security Trends of 2012
Top Application Security Trends of 2012
DaveEdwards12
?
20111214 iisf shinoda_
20111214 iisf shinoda_
Directorate of Information Security | Ditjen Aptika
?
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
Ulf Mattsson
?
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
tmacuk
?
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012
Imperva
?
Digital trends rhoton-20111205
Digital trends rhoton-20111205
Hellenic Professionals Informatics Society
?
Compusecuraphobia ¨C The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia ¨C The Fear of HOPING Your Computer is Secure - Course Techn...
Cengage Learning
?
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
Hackito Ergo Sum
?
2011 App Failures - Year in Review CAST
2011 App Failures - Year in Review CAST
CAST
?
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09 Social Engineering
Mike Murray
?
Top Security Trends for 2013
Top Security Trends for 2013
Imperva
?
Isaca june 19, 2010
Isaca june 19, 2010
Vicky Shah
?
Trustwave 2012 Global G¨¹venlik Raporu
Trustwave 2012 Global G¨¹venlik Raporu
Erol Dizdar
?
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Forum
?
ASFWS 2012 - Cybercrime to Information Warfare & ¡°Cyberwar¡±: a hacker¡¯s persp...
ASFWS 2012 - Cybercrime to Information Warfare & ¡°Cyberwar¡±: a hacker¡¯s persp...
Cyber Security Alliance
?
Alex hutton metricon
Alex hutton metricon
Alexander Hutton
?
Cybercrime
Cybercrime
Keller Williams Lynchburg
?
Protect Your Drupal Site Against Common Security Attacks
Protect Your Drupal Site Against Common Security Attacks
Acquia
?
Cyber security master class 2018
Cyber security master class 2018
Sanjana Khound
?
Ciso executive summit 2012
Ciso executive summit 2012
Bill Burns
?
ICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial Services
Brad Garland
?
Community Is King
Community Is King
Brad Garland
?

More Related Content

Similar to Garland Group - Top Security Threats of 2011 (20)

Top Application Security Trends of 2012
Top Application Security Trends of 2012
DaveEdwards12
?
20111214 iisf shinoda_
20111214 iisf shinoda_
Directorate of Information Security | Ditjen Aptika
?
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
Ulf Mattsson
?
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
tmacuk
?
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012
Imperva
?
Digital trends rhoton-20111205
Digital trends rhoton-20111205
Hellenic Professionals Informatics Society
?
Compusecuraphobia ¨C The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia ¨C The Fear of HOPING Your Computer is Secure - Course Techn...
Cengage Learning
?
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
Hackito Ergo Sum
?
2011 App Failures - Year in Review CAST
2011 App Failures - Year in Review CAST
CAST
?
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09 Social Engineering
Mike Murray
?
Top Security Trends for 2013
Top Security Trends for 2013
Imperva
?
Isaca june 19, 2010
Isaca june 19, 2010
Vicky Shah
?
Trustwave 2012 Global G¨¹venlik Raporu
Trustwave 2012 Global G¨¹venlik Raporu
Erol Dizdar
?
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Forum
?
ASFWS 2012 - Cybercrime to Information Warfare & ¡°Cyberwar¡±: a hacker¡¯s persp...
ASFWS 2012 - Cybercrime to Information Warfare & ¡°Cyberwar¡±: a hacker¡¯s persp...
Cyber Security Alliance
?
Alex hutton metricon
Alex hutton metricon
Alexander Hutton
?
Cybercrime
Cybercrime
Keller Williams Lynchburg
?
Protect Your Drupal Site Against Common Security Attacks
Protect Your Drupal Site Against Common Security Attacks
Acquia
?
Cyber security master class 2018
Cyber security master class 2018
Sanjana Khound
?
Ciso executive summit 2012
Ciso executive summit 2012
Bill Burns
?
Top Application Security Trends of 2012
Top Application Security Trends of 2012
DaveEdwards12
?
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
Ulf Mattsson
?
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
tmacuk
?
Top 9 Data Security Trends for 2012
Top 9 Data Security Trends for 2012
Imperva
?
Compusecuraphobia ¨C The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia ¨C The Fear of HOPING Your Computer is Secure - Course Techn...
Cengage Learning
?
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
Hackito Ergo Sum
?
2011 App Failures - Year in Review CAST
2011 App Failures - Year in Review CAST
CAST
?
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09 Social Engineering
Mike Murray
?
Top Security Trends for 2013
Top Security Trends for 2013
Imperva
?
Isaca june 19, 2010
Isaca june 19, 2010
Vicky Shah
?
Trustwave 2012 Global G¨¹venlik Raporu
Trustwave 2012 Global G¨¹venlik Raporu
Erol Dizdar
?
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Day, May2011-- Information Assurance
Egypt Cloud Forum
?
ASFWS 2012 - Cybercrime to Information Warfare & ¡°Cyberwar¡±: a hacker¡¯s persp...
ASFWS 2012 - Cybercrime to Information Warfare & ¡°Cyberwar¡±: a hacker¡¯s persp...
Cyber Security Alliance
?
Protect Your Drupal Site Against Common Security Attacks
Protect Your Drupal Site Against Common Security Attacks
Acquia
?
Cyber security master class 2018
Cyber security master class 2018
Sanjana Khound
?
Ciso executive summit 2012
Ciso executive summit 2012
Bill Burns
?

More from Brad Garland (7)

ICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial Services
Brad Garland
?
Community Is King
Community Is King
Brad Garland
?
FFIEC Regulatory Training
FFIEC Regulatory Training
Brad Garland
?
Next Generation Banking with Generation Y
Next Generation Banking with Generation Y
Brad Garland
?
Banking on Social Media
Banking on Social Media
Brad Garland
?
Web2.0 and your Bank - The Consumers
Web2.0 and your Bank - The Consumers
Brad Garland
?
Web 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The Technology
Brad Garland
?
ICBA Presentation on Web 2.0 & Financial Services
ICBA Presentation on Web 2.0 & Financial Services
Brad Garland
?
FFIEC Regulatory Training
FFIEC Regulatory Training
Brad Garland
?
Next Generation Banking with Generation Y
Next Generation Banking with Generation Y
Brad Garland
?
Banking on Social Media
Banking on Social Media
Brad Garland
?
Web2.0 and your Bank - The Consumers
Web2.0 and your Bank - The Consumers
Brad Garland
?
Web 2.0 and your Bank - The Technology
Web 2.0 and your Bank - The Technology
Brad Garland
?
Ad

Recently uploaded (20)

IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
?
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
?
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
?
2025 Completing the Pre-SET Plan Form.pptx
2025 Completing the Pre-SET Plan Form.pptx
mansk2
?
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
?
LDMMIA Yoga S10 Free Workshop Grad Level
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
?
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
?
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
?
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
?
Gladiolous Cultivation practices by AKL.pdf
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
?
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
?
Peer Teaching Observations During School Internship
Peer Teaching Observations During School Internship
AjayaMohanty7
?
How to Manage Different Customer Addresses in Odoo 18 Accounting
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
?
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
?
How to use _name_search() method in Odoo 18
How to use _name_search() method in Odoo 18
Celine George
?
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
?
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
?
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
?
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
?
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
?
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
?
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
?
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
GREAT QUIZ EXCHANGE 2025 - GENERAL QUIZ.pptx
Ronisha Das
?
2025 Completing the Pre-SET Plan Form.pptx
2025 Completing the Pre-SET Plan Form.pptx
mansk2
?
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
?
LDMMIA Yoga S10 Free Workshop Grad Level
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
?
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
?
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
?
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
?
Gladiolous Cultivation practices by AKL.pdf
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
?
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
?
Peer Teaching Observations During School Internship
Peer Teaching Observations During School Internship
AjayaMohanty7
?
How to Manage Different Customer Addresses in Odoo 18 Accounting
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
?
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
?
How to use _name_search() method in Odoo 18
How to use _name_search() method in Odoo 18
Celine George
?
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
?
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
?
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
?
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
?
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
?
Ad

Garland Group - Top Security Threats of 2011

  • 1. Top Security Threats for 2011 Thursday, March 31, 2011
  • 2. Presenter Eric Kitchens, CISSP/CISA eric@thegarlandgroup.net Thursday, March 31, 2011
  • 3. riskkey.com ? IT Audit / Security Testing ? Continuous Compliance ? Collaboration Consulting Thursday, March 31, 2011
  • 4. What Are The Top Security Threats for 2011? Thursday, March 31, 2011
  • 5. Something Old, Something New, Something Borrowed... Thursday, March 31, 2011
  • 6. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. Thursday, March 31, 2011
  • 7. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. New and emerging threats often are combinations of ¡°old¡± threats. Thursday, March 31, 2011
  • 8. Something Old, Something New, Something Borrowed... Threats that were big news in the past are still out there. New and emerging threats often are combinations of ¡°old¡± threats. It¡¯s never too late to mitigate. Thursday, March 31, 2011
  • 9. Something Old... Threats that have been with us for many years and will be with us for years to come. Thursday, March 31, 2011
  • 10. Something Old... Threats that have been with us for many years and will be with us for years to come. ? Mobile Devices Thursday, March 31, 2011
  • 11. Something Old... Threats that have been with us for many years and will be with us for years to come. ? Mobile Devices ? Cloud Computing & Virtualization Thursday, March 31, 2011
  • 12. Something Old... Threats that have been with us for many years and will be with us for years to come. ? Mobile Devices ? Cloud Computing & Virtualization ? Application Vulnerabilities Thursday, March 31, 2011
  • 14. Mobile Devices ? Various Platforms Thursday, March 31, 2011
  • 15. Mobile Devices ? Various Platforms ? Mal-Ware in the AppStore Thursday, March 31, 2011
  • 16. Mobile Devices ? Various Platforms ? Mal-Ware in the AppStore ? Merging Business & Personal Use Thursday, March 31, 2011
  • 17. Mobile Devices ? Various Platforms ? Mal-Ware in the AppStore ? Merging Business & Personal Use ? Lost or Stolen Devices & Data Thursday, March 31, 2011
  • 19. Cloud Computing ? Expanding Scope of Virtualization Thursday, March 31, 2011
  • 20. Cloud Computing ? Expanding Scope of Virtualization ? Outsourced Applications and Services Thursday, March 31, 2011
  • 22. Application Vulnerabilities ? Operating System Vulnerabilities are Decreasing Thursday, March 31, 2011
  • 23. Application Vulnerabilities ? Operating System Vulnerabilities are Decreasing ? Application Speci?c Vulnerabilities are on the Rise Thursday, March 31, 2011
  • 24. Application Vulnerabilities ? Operating System Vulnerabilities are Decreasing ? Application Speci?c Vulnerabilities are on the Rise ? Evaluate Automated Patching Tools for All Applications & Systems Thursday, March 31, 2011
  • 25. Something New... Not ¡°new¡± but emerging and evolving into new problems Thursday, March 31, 2011
  • 26. Something New... Not ¡°new¡± but emerging and evolving into new problems ? Advanced Persistent Threats Thursday, March 31, 2011
  • 27. Something New... Not ¡°new¡± but emerging and evolving into new problems ? Advanced Persistent Threats ? Hacktivisim Thursday, March 31, 2011
  • 28. Something New... Not ¡°new¡± but emerging and evolving into new problems ? Advanced Persistent Threats ? Hacktivisim ? Cyberterrorism Thursday, March 31, 2011
  • 30. Advanced Persistent Threats ? Google and RSA Are Recent Examples Thursday, March 31, 2011
  • 31. Advanced Persistent Threats ? Google and RSA Are Recent Examples ? Executed Over Extended Period of Time Thursday, March 31, 2011
  • 32. Advanced Persistent Threats ? Google and RSA Are Recent Examples ? Executed Over Extended Period of Time ? Adapts to Defenses and Mitigation Strategies Thursday, March 31, 2011
  • 33. Advanced Persistent Threats ? Google and RSA Are Recent Examples ? Executed Over Extended Period of Time ? Adapts to Defenses and Mitigation Strategies ? Baselining and Monitoring are Essential for Defense Thursday, March 31, 2011
  • 35. Cyber-Terrorism & Hacktivism ? DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. Thursday, March 31, 2011
  • 36. Cyber-Terrorism & Hacktivism ? DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. ? Disrupting Services for Ideological Purposes Thursday, March 31, 2011
  • 37. Cyber-Terrorism & Hacktivism ? DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. ? Disrupting Services for Ideological Purposes ? Tools are Freely Available to Non-Technical Users Thursday, March 31, 2011
  • 38. Cyber-Terrorism & Hacktivism ? DoS of Visa and MasterCard from WikiLeaks Supporters are Prime Examples. ? Disrupting Services for Ideological Purposes ? Tools are Freely Available to Non-Technical Users ? Be Aware of Outsourced Relationships and Higher Risk Customers They Service Thursday, March 31, 2011
  • 40. Something Borrowed... ¡°I swear, I meant to return all the con?dential data on my USB drive after I was done ¡®borrowing¡¯ it!¡± Thursday, March 31, 2011
  • 41. Something Borrowed... ¡°I swear, I meant to return all the con?dential data on my USB drive after I was done ¡®borrowing¡¯ it!¡± ? Insider Threats Thursday, March 31, 2011
  • 42. Something Borrowed... ¡°I swear, I meant to return all the con?dential data on my USB drive after I was done ¡®borrowing¡¯ it!¡± ? Insider Threats ? Data Classi?cation and Control Thursday, March 31, 2011
  • 43. Something Borrowed... ¡°I swear, I meant to return all the con?dential data on my USB drive after I was done ¡®borrowing¡¯ it!¡± ? Insider Threats ? Data Classi?cation and Control ? USB Storage Devices Thursday, March 31, 2011
  • 45. Thanks. Email: eric@thegarlandgroup.net Web: http://www.thegarlandgroup.net Thursday, March 31, 2011