24

Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while
Page 2: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Security Threats and Trends –Middle EastLorna Trayan

Page 3: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Agenda» Security Threats and Trends – Global» Security Threats and Trends – Industry-specific» Notable Attack Vectors» Attack Maps and Visualizations» Cost of a Data Breach – Ponemon Institute» Assumptions for Your Security Strategy - Gartner

3

Page 4: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Security Threats and TrendsGlobal View

Page 5: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

An unprecedented amount of records and unstructured data leaked around the global in 2016

20141,000,000,000 records

breached, while CISOs cite increasing risks from external

threats

2015Healthcare mega-breachesset the trend for high value

targets of sensitive information

Source: IBM X-Force Threat Intelligence Index - 2017

2016Larger than life breaches

as over four billion records and entire digital footprints of many

companies were exposed

Page 6: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Source: IBM X-Force Threat Intelligence Index - 2017

In addition to PII, much larger caches of unstructured data were also exposed in 2016.

Page 7: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Security Threats and TrendsIndustry View

Page 8: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Information and communications led the pack in most successfully breached companies

Source: IBM X-Force Threat Intelligence Index - 2017

Page 9: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Source: IBM X-Force Threat Intelligence Index - 2017

Page 10: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Notable Attack Vectors

Page 11: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Record vulnerabilities disclosures topped 10,000, with new discoveries up across all classes of software.

Source: IBM X-Force Threat Intelligence Index - 2017

Page 12: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Spam email volume grew fourfold, with nearly half of spam containing malicious attachments

Source: IBM X-Force Threat Intelligence Index - 2017

Page 13: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Attack Maps & VisualizationsRegional View

Page 14: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Source: http://map.norsecorp.com/

NB. This image is a point-in-time (May 13th 2016) representation of the attacks happening to the UAE

Norse - The UAE is a target

Page 15: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Kaspersky – CyberThreat Real-time Map

Source: https://cybermap.kaspersky.com/

Page 16: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

TrendMicro - Command & Control Servers communicating with target computers in the UAE

Source: http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html - May 22nd 2016

NB. This is a point-in-time representation of the attacks happening to the UAE

Page 17: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

In this example, Recorded future is being used to monitor the most active malware targeting GCC countries. From here, an analyst can easily pivot to a strain of malware of interest (e.g. Shamoon, or Mamba), in order to gain real-time, actionable intel on that malware within seconds.

Recorded Future - Analysis of cyber campaigns targeting GCC countries

Page 18: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Recorded Future - Most Active Threat Actors in GCC & Their Methods

Commercial Threat Intelligence Feed: RecordedFuture

Page 19: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Cost of a Data BreachMiddle East and Industries

Page 20: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

$71 $101

$119 $123 $124 $131 $132 $137

$149 $150 $154 $165

$188 $200

$223 $245

$380

Public SectorResearch

MediaTransportation

HospitalityEntertainment

ConsumerEnergy

IndustrialCommunications

RetailTechnologyLife science

EducationServices

FinancialHealth

Globally: The per-record cost of a data breach also varies widely by industry

Currencies converted to US dollars

Up 7%Up 10.9%

Up 7.2%Down 18.7%

Up 13.8%Down 3.6%

Down 10.5%

Down 8.5%Down 4.5%

Down 7.4%Down 0.8%*

Down 10.8%Down 4.7%

Down 9.1%

Down 9.8%

Down11.3% *Comparative y-t-y data not available

Percent change over 2016:IncreaseDecrease

Page 21: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Middle East (Saudi Arabia and United Arab Emirates)

4 years in the study27 companies participated

Currency: Saudi Arabian Riyal (SAR)

Per-record costs for top three industries

Average number of breached records33,125

Average cost of lost business7.57M SAR

Average total cost of data breach

18.54M SAR 7%

Average cost per record lost or stolen580 SAR 10%

Financial

830 SAR Services

745 SAR

Technology692 SAR

Page 22: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Assumptions for Your Security StrategyRecommendations by Gartner

Page 23: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Gartner: Strategic Planning Assumptions for Security» By 2020, a third of successful attacks experienced by enterprises will be on their

shadow IT resources. » Through 2021, the single most impactful enterprise activity to improve security

will be patching. » Through 2021, the second most impactful enterprise activity to improve security

will be removing web server vulnerabilities. » Through 2020, 99% of vulnerabilities exploited will continue to be the ones known

by security and IT professionals for at least one year. (Not the zero days as everyone thinks).

» When gathering Threat Intelligence, quality over quantity, target “Actionable Threats” that are relevant to you. Hire a Security Intelligence Analyst.

» Integrate Analytics into your solutions, but don’t get carried away with the Market Hype of the Artificial Intelligence.

Page 24: Security Threats and Trends Middle East€¦ · An unprecedented amount of records and unstructured data leaked around the global in 2016 2014 1,000,000,000 records. breached, while

Thank YouAny Questions?