Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
AGENDA
A Quick Recap of
2011
How To
Stay Secure
EMC/RSA SecurID
Epsilon
SK Communications
8:32 AM
12TH DAY
Android Breaches
May Allow data access Jun Google removes 10 apps Dec Record calls, send SMS Dec Access device location
3. Cloud Environments
4. Cyber Warfare
Previous CyberAttacks
Aug 2011
: Shady RAT attacks IOC, UN and several governments : International Monetary Fund attacked, data stolen : Google China Aurora breach, Data and IP stolen
: GhostNet downloads classified documents from government and private servers in over 100 countries : Middle Eastern US Military Facility infiltrated, digital beachhead may have been established in classified Pentagon networks : South Ossetia War Russian, Georgian and Azerbaijan targeted : Estonia comes under cyber attack
2008
April 2007
Enabler Consumerization Of IT
More Data Is Stored Digitally
Paper Based Systems Out-of-Date Electronic Processes
Easier To Profit
Organized Crime Growing Black Market
* datalossdb.com
Sources of Risk
Intellectual property theft Financial and Identity data Medical and Personal Health records Point of Sale at retail locations Email addresses
Information
End Point Applications Network Scanners Compliance User IT Operations
Traditional Solutions
Bolted On Architecture-Specific Lacking Automation Limited Context
Multiple Technologies
Lots of Information
No Intelligence
HP has the on ly s ecu r it y in t elligen ce plat for m that gives clients the insight to pr oact iv ely m an age their specific enterprise threats and r is k s .
Establish complete Visibility across all applications and systems Analyze vulnerabilities in applications and operations to understand risk Respond adaptively to build defenses against the exploitation of vulnerabilities Measure security effectiveness and risk across people, process, and technology to improve over time
Operations
Applications
Security Services
Application Security
THANK YOU
25