information security, cybercrime and technology futures allowing you to get a clear insight into the...

23
Power to the People? Rik Ferguson• Director Security Research & Communications

Upload: insight-uk

Post on 15-Nov-2014

298 views

Category:

Technology


0 download

DESCRIPTION

Rik Ferguson and expert in Security Research & Communications discusses Cybercrime and how this can impact your business today.

TRANSCRIPT

Page 1: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Power to the People?Rik Ferguson• Director Security Research & Communications

Page 2: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Consumerisation of IT

• Popular new consumer technology spreads into business organizations

• IT and consumer electronics converge as the same devices are used for work and play

• Power shifts from corporate IT and enterprise vendors (IBM, HP) to end users and innovative consumer vendors (Apple, Google)

“Consumerisation will be the most significant trend affecting IT during the next 10 years”

Gartner

Page 3: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

…Not just mobile devicesSocial Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Email Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Email

Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Email Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-Fi | File Transfer/Sharing | Videoconference | Mobile devices | Social Networking | Email | Voice over IP | Cloud Applications | Wi-

Page 4: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

4

The IT View: Current Pain Points

iPad

Page 5: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

5

What’s Really Happening• The current pain points are simply the leading edge of a bigger wave.

• Tactical solutions will always remain reactive and be susceptible to disruption by the next wave.

iPadiPhone

Windows phone

Page 6: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

The also-rans

Page 7: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

The winners (for now)

Page 8: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Consumer is King

Page 9: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Some recent iOS Vulnerabilities

• CVE-2011-3246 – Malicious URLs disclose sensitive information

• CVE–2011-3439 – Malicious font leads to arbitrary code execution

• CVE-2011-3442 – Ability to bypass code-signing checks

• CVE-2011-3255 – Apple ID & password could be intercepted by installed apps

Page 10: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Some recent Android Vulnerabilities

• CVE-2011-3874 – Buffer Overflow allows code execution

• CVE-2011-1823 – Local code execution and root privileges (Gingerbreak)

• CVE-2011-1149 – Bypass sandbox and escalate privileges (KillingInTheNameOf)

• A multitude of Adobe Flash vulnerabilities

Page 11: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Classification 04/08/2023

11

MOBILE MALWAREYes… It’s real.

Page 12: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

But Google told me you are all Charlatans!

Page 13: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Mobile Malware - Android is where the action is

Page 14: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Malicious Marketplace• March 2011 - 58 malicious apps (approx

250,000 victims)

• May 2011 - 24 malicious apps (up to 120,000 victims)

• December 2011 - 27 malicious apps (approx 14,000 victims).

• February 2012 – 37 “Fan Apps” stealing handset information and aggressive advertising

Page 15: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

It’s not only the vulnerabilities

Page 16: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

And here’s how it works…

Page 17: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Consumerisation is Driving a Shift

17

• The advent of consumerisation in the last few years is causing organizations to rethink the value of consumer-grade tools and services.

Consumerization

Page 18: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

IT is Losing Control

Page 19: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

IT is Losing Control

This shift of control away from corporate IT has three main results

Loss of visibility and control as these “BYOD”

devices and modes of communicating proliferate

in business IT environments

1

“De-standardization” increases the cost and difficulty of managing and delivering data to

an increasingly heterogeneous endpoint

landscape

2

Unpredictability of where data will be consumed by

end-users increases challenge of data protection

3

Tactical solutions will not address this fundamental change

Page 20: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Unlock Opportunity

• Business agility

• Virtual work style

• Move at the customer speed

• Increase end-user productivity

• Attract and retain talent

Page 21: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

“Embrace” Is the Optimal Approach

1 2 3

Strategy: Create a plan

Say Yes… but not to everything for

everyone

Deploy an enterprise-grade

infrastructure

Page 22: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Key Features for Mobile Security• Reduce costs, improve business agility, empower employees.

• Regain visibility and control, share and protect data in a heterogeneous environment

• “Embrace consumerization, unlock opportunity!”

Regain visibility & control

Deploy with confidence

Measure effectiveness

…whatever the device, wherever the user

EnrollmentManagementProvisioning

Tracking

Policy EnforcementAnti malwareEncryption

Remote Lock/Wipe

MonitorReportReact

Integrate

Page 23: Information Security, Cybercrime and technology futures allowing you to get a clear insight into the challenges and issues facing your businesses today - Insight Technology Show 2012

Thank [email protected]