Mr. Bulent Teksoz - Security trends and innovations

Post on 19-Jan-2017

569 views 1 download

Transcript of Mr. Bulent Teksoz - Security trends and innovations

Bulent TeksozChief Security Strategist for Emerging Markets

@bteksoz

Security Trends and Innovations

Kuwait Info Security Conference – May 2012

2

Good News

Bad News

@bteksoz Kuwait Info Security Conference – May 2012

3@bteksoz Kuwait Info Security Conference – May 2012

Targeted Attacks by Sector

Government & Public SectorManufacturingFinanceIT ServicesChemical & PharmaceuticalTransport & UtilitiesNon-ProfitMarketing & MediaEducationRetail

4@bteksoz Kuwait Info Security Conference – May 2012

5@bteksoz Kuwait Info Security Conference – May 2012

6@bteksoz Kuwait Info Security Conference – May 2012

Four Key Trends

Internet Security Threat Report, Vol. 17

Malware Attacks81% ↑

Targeted Attacks Expand

Mobile Threats

Expose All

Data Breaches on Rise

7@bteksoz Kuwait Info Security Conference – May 2012

8

What about Kuwait?

@bteksoz Kuwait Info Security Conference – May 2012

9@bteksoz Kuwait Info Security Conference – May 2012

10

@bteksoz Kuwait Info Security Conference – May 2012

11

@bteksoz Kuwait Info Security Conference – May 2012

What’s Ahead in 2012?

Macs are not immune

Targeted attacks will continue

Attackers will capitalize on

work/personal info on mobiles

Cloud computing and mobile will

force IT to rethink security

12

@bteksoz Kuwait Info Security Conference – May 2012

The Big Question

14

How secure are we now?

@bteksoz Kuwait Info Security Conference – May 2012

15

@bteksoz Kuwait Info Security Conference – May 2012

One Dashboard

16

• Risk - volume becoming impossible to manage• Acceptance that breaches will occur• Change in focus from asset to information• Business demands – consolidate security (Back to

basics)– Risk based approach (Information & identity centric)– Security must become a two way street (stop exfiltration of

data)– Smarter Intelligence – Centralized correlated timely visibility & activity

Summary – What does that mean?

Thank you!Thank you!

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Bulent Teksoz

17

@bteksoz

@bteksoz Kuwait Info Security Conference – May 2012