Next Generation Information Security – Jason Witty
Some statistics and facts to set the scene;
– 93.6% is the approximate percentage of digital currency in the global market!
– 6.4% cash and gold available as a proportion of banking and commerce funds..
– 45% US adults own a smartphone – 21% of phone users did mobile banking last year.
– 62% of all adults globally use social media
– Cloud ranking as #1 in top strategic technologies according to Gartner – 60% of the public cloud will serve software by 2018
– 2015 predicted as the year when online banking will become the norm..
– Nielson global trust in advertising report for 2012;
– 28,800 respondents across 56 countries – Online recommendations from known people and review sites 80-90%+used and trusted, traditional media, falling below 50% used and trusted.
– NSA were working on their own secure smartphone. Plans scrapped and now they are working on how to effectively secure consumer smart phone devices. Consumer mobile devices are everywhere!
Emerging innovations; cloud computing..
– IDC forecasts $100bn will be spent per year by 2016, compared to $40bn now.
– By 2016 SaaS will account for 60% of the public cloud
Cost savings often cited as reason for moving to the cloud; however other benefits like agility, access to more flexible compute power etc. often mean cloud migrations enable better IT for the business and thus you can do more. So increased quality and profit result, but casts likely remain flat.
Trends in Cybercrime;
Insiders – can be difficult to detect, usually low tech relying on access privileges
Hacktivists – responsible for 58% of all data theft in 2011
Organised crime – Becoming frighteningly organised and business like
Nations states – Since 2010 nation state created malware has increased from 1 known to 8 known with 5 of those in 2012. Nation states now creating dedicated cyber-warfare departments, often as official, dedicated parts of the military.
Organised Crime – Malware as a Service
Raw material (stolen data) – Distribution (BotNet) – Manufacturer (R&D, Code, Product Launch) – Sales and support (Delivery, Support (MSI package installation, helpdesk), Marketing – Customer (Affiliates, Auctions / Forums, BotNet Rental / Sales)
Crime meets mobile – Android – patchiy updates as vendor dependant, many pieces of malware, but play store security getting better.
Nation states becoming increasingly active in the world of malware creation..
So, Next generation Information Security;
– Must be intelligence driven
- Business line
- Cyber threat
– Must be comprehensive
- Anticipate – emerging threats and risks
- Enable –
– Must have excellent human capabilities
– Must be understandable – need to explain this and ensure the board understands the risks and issues – PwC survey – 42% of leadership think their organisation is a security front runner. 8% actually are. 70% leadership thing info sec working well – 88% of infosec think leadership their largest barrier to success..
– We cannot do this alone: Strong intelligence partnership management
Pending cybercrime legislation;
– White house has stressed importance of new cyber security legislation.
– Complex laws take time to review and pass; technology environments change fast.
– Various Federal laws currently cover cybercrime – Federal computer fraud and abuse act, economic espionage act etc.
– Likely executive order in the near future with potentially large cybercrime implications.
While this is a very US centric view, many countries or regions are planning to enact further, more stringent laws / regulations that will impact the way we work.
Intelligence driven: the next phase in information security;
– Conventional approaches to information security are struggling to meet increasingly complex and sophisticated threats
– Intelligence driven security is proactive – a step beyond the reactive approach of the compliance-driven or incident response mind-sets
– Building and nurturing multiple data sources. Developing an organisational ability to consolidate, analyse and report, communicate effectively and then act decisively benefits both operational / tactical security and strategy.
– Establish automated analytics and establishing patterns of data movement in your organisation
I recommend you review – Getting ahead of advanced threats: Achieving intelligence-driven information security – RSA report, 2012. This can be downloaded from here;