430 likes | 509 Views
IBM Security. The Evolving Global and South African Security Threats IBM Security Tamer Aboualy , Ph.D. CTO & Partner, IBM MEA Security Practice. Russian hackers claim 7,000 credentials leaked, 400 pasted on Pastebin. Intellectual property & critical information compromised.
E N D
IBMSecurity The Evolving Global and South African Security Threats IBM Security Tamer Aboualy, Ph.D. CTO & Partner, IBM MEA Security Practice
Russian hackers claim 7,000 credentials leaked, 400 pasted on Pastebin Intellectual property & critical information compromised. Celebrity nude photo’s & other info compromised. Hack Costs Add Up to $148M
Today’s criminals are learning the Cybercrime business.... its a work at home job that pays well!
Exploiting trust is one example of attackers becoming more operationally sophisticated to breach targets Many breaches are not the result of custom malwareand zero-day exploits, attackers look for paths of least resistance
Near Daily Leaks of Sensitive Data 40% increase in reported data breaches and incidents Relentless Use of Multiple Methods 800,000,000+ records were leaked, while the future shows no sign of change “Insane” Amounts of Records Breached. 25% Records 42% of CISOs claim the risk from external threats increased dramaticallyfrom prior years.
32M Cheaters Exposed Globally Including South Africa xxx xxx
Based on pure volume, the total number of records breached in 2014 was nearly 25 percent higher than in 2013 Source:IBM X-Force Threat Intelligence Report Quarterly 2015
For the average client, IBM filters 1,764,720 security events weekly to identify the 2 security incidents that can potentially do harm. Security attacks Security incidents Security events Annual91,765,453 Annual: 16,856 Annual: 109 Monthly7,647,121 Monthly: 9 Monthly: 1,405 Weekly 1,764,720 Weekly: 2 Weekly : 324 up 22% up 12% Security IntelligenceCorrelation and analytics tools Security IntelligenceHuman security analysts Events: up 12% year-to-year to 91M Observable occurrences in a system or network Attacks: Increased efficiencies achieved Greater efficiency in security processing to help clients focus on identified malicious events Incidents: up 22% year-to-year Attacks deemed worthy of deeper investigation
Who is attacking your networks? Inadvertent actors may be a small segment but they are potentially the most dangerous Combination Outsiders 22% 56% Malicious insiders More than half of all attacks are likely to be instigated by opportunistic outsiders 17% Inadvertent actor 5%
Question?Is South Africa at Risk of Security Attacks and Breaches like North America, Europe, Asia, and the Rest of the World?
Anonymous Hacks South African Government Contractor IT Company and Subsidiaries August 12, 2015. Cyberguerrilla.org reports Anonymous https://www.cyberguerrilla.org/blog/anonymous-hacks-south-african-government-contractor-it-companys-subdairies-coffeesec-lulz/
SpyCables leak from South Africa Secret Service and National Intelligence Agency found by Aljazeera Source: CityPress Source: CityPress Source: Aljazeera Source: DocumentCloud
Governmentsare prime targets to hack and publicly defaced. Source: PasteBin The South African government agencies have been compromised a few times, with no visible preventative actions taken.
Question? Is South Africa’s Security Hygiene Better or Worse Than The Rest of the World?
South Africa Protects its Computers with Security Software Source: www.microsoft.com/sir
South Africa Malware Encounter and Infection Rates Source: www.microsoft.com/sir
Top 10 Malware for South Africa Source: www.microsoft.com/sir Microsoft Regional Security Intelligence Report
Proportion of eMail Identified as Phishing South Africa Ranks in the Top 10 Globally for eMail Phishing IBM MSS Cloud Security Services (Symantec 2015 Internet Security Threat Report)
Proportion of eMail Identified as Malicious South Africa Ranks in the Top 10 Globally for Malicious eMail IBM MSS Cloud Security Services (Symantec 2015 Internet Security Threat Report)
South Africa - Website Defacements Cause Reputation Impact Zone-H reported more then 102,557 defacements for the .co.zadomain suffix. 578gov.za defacements 200+ defacements in 2015 alone Source: zone-h.org
Various South African websites have been publically defaced gcis.gov.za November 11, 2014 Government Communication & Information Systems Department Ortambodm.gov.za February 12, 2015. South Africa Airport sasol.co.za December 2, 2014. Sasol is an international energy and chemicals company with 37 locations globally
Recent Government Defacements dmr.gov.za - Department of Minerals and Resources 09-12-2015 www.gssc.gpg.gov.za 2015-03 -11 Gauteng Shared Services Center
Anything that is connected to the Internet can be hacked.Everything is being connected to the Internet
The Worlds Most Dangerous Search Engine Our Cities and Countries Critical Infrastructures Need to Be Protected shodanhq.com Like google searches the internet for publicly accessible devices. SHODAN focused primarily on ICS devices, like city traffic lights, building/city cameras, water/power stations, nuclear stations. Anyone can use it, it’s free and newly discovered devices are mapped daily! CNN 2013 May 2013
SHOWDAN Cisco No Password Search of South Africa
Question? Why IBM Security?
IBM has the world’s broadest and deepest security portfolio SkillsShortage SECURITY TRENDS Advanced Threats Cloud Mobile andInternet of Things ComplianceMandates DELIVERYMODELS
The IBM Security Journey IBMSecurity IBM Security IBM Security Systems IBM Security Services IBM Security Systems • IBM Security Services
Our Position Today 11 5 4 Gartner Magic Quadrant and MarketScope Reports Forrester WaveReports IDC Market Share Reports RESULTS INVESTMENT LEADERSHIP 2 13 quarters ofstrong growth 20 acquisitions leadership positions in analyst rankings 70+ 3x new products or major enhancements the market growth 70+ new or updated offerings in 2014
IBM helps protect against new, complex security challenges Optimize security program Stop advanced threats Integrate security silos, reduce complexity, and lower costs Use analytics and insights for smarter integrated defense Protect critical assets Safeguard cloud and mobile Use context-aware, role-based controls to help prevent unauthorized access Employ cloud and mobile initiatives to build a new, stronger security posture
Optimize your security program Integrate security silos, reduce complexity, and lower costs Risk-AwareCulture & Strategy Assess and transform your security maturity Build a next generation security operations capability End-to-End Security Intelligence IntelligentThreat Protection& Response Get help from the experts
Stop advanced threats Use analytics and insights for smarter integrated defense Protect against fraud and targeted attacks Detect advanced threats with security intelligence Deploy integrated security
Protect critical assets Use context-aware, role-based controls to help prevent unauthorized access Use context-aware controls to prevent unauthorized access Identify and protect your “crown jewels” Manage application security risk
Do you know what and where your organizations most critical data assets are? • For most organizations, the most critical data – the “Crown Jewels” – amount to between 0.01% and 2.0% of total sensitive data1 • The theft, misuse or corruption of this critical data can: • cripple operations • severely damage brand reputation • dramatically reduce shareholder value Source: U.S. President’s 2006 Economic Report to Congress
Safeguard cloud and mobile Employ cloud and mobile initiatives to build a new, stronger security posture SaaS IaaS PaaS Maintain cloud visibility and control Help protect the mobile enterprise
Ten Essential Steps to Creating an Intelligent Security Management Program Understand Security Essentials 3 Secure collaboration in social and mobile workplace 6 Create a secure and resilient network 4 Develop secure products, by design 5 Manage IT and OT hygienically GOAL: INTELLIGENT CYBER THREAT PROTECTION AND RISK MANAGEMENT 1 Build a risk aware culture and management system 2 Establish intelligent security operations and rapid threat response 10 Manage the digital identity lifecycle 7 Address security complexity of cloud and virtualization 9 Assure data security and privacy 8 Manage third party security compliance