Post on 19-Jan-2017
Bulent TeksozChief Security Strategist for Emerging Markets
@bteksoz
Security Trends and Innovations
Kuwait Info Security Conference – May 2012
2
Good News
Bad News
@bteksoz Kuwait Info Security Conference – May 2012
3@bteksoz Kuwait Info Security Conference – May 2012
Targeted Attacks by Sector
Government & Public SectorManufacturingFinanceIT ServicesChemical & PharmaceuticalTransport & UtilitiesNon-ProfitMarketing & MediaEducationRetail
4@bteksoz Kuwait Info Security Conference – May 2012
5@bteksoz Kuwait Info Security Conference – May 2012
6@bteksoz Kuwait Info Security Conference – May 2012
Four Key Trends
Internet Security Threat Report, Vol. 17
Malware Attacks81% ↑
Targeted Attacks Expand
Mobile Threats
Expose All
Data Breaches on Rise
7@bteksoz Kuwait Info Security Conference – May 2012
8
What about Kuwait?
@bteksoz Kuwait Info Security Conference – May 2012
9@bteksoz Kuwait Info Security Conference – May 2012
10
@bteksoz Kuwait Info Security Conference – May 2012
11
@bteksoz Kuwait Info Security Conference – May 2012
What’s Ahead in 2012?
Macs are not immune
Targeted attacks will continue
Attackers will capitalize on
work/personal info on mobiles
Cloud computing and mobile will
force IT to rethink security
12
@bteksoz Kuwait Info Security Conference – May 2012
The Big Question
14
How secure are we now?
@bteksoz Kuwait Info Security Conference – May 2012
15
@bteksoz Kuwait Info Security Conference – May 2012
One Dashboard
16
• Risk - volume becoming impossible to manage• Acceptance that breaches will occur• Change in focus from asset to information• Business demands – consolidate security (Back to
basics)– Risk based approach (Information & identity centric)– Security must become a two way street (stop exfiltration of
data)– Smarter Intelligence – Centralized correlated timely visibility & activity
Summary – What does that mean?
Thank you!Thank you!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Bulent Teksoz
17
@bteksoz
@bteksoz Kuwait Info Security Conference – May 2012