Download PPT - Cyber Seminar

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Business intelligence wikipedia , lookup

Information privacy law wikipedia , lookup

Mobile business intelligence wikipedia , lookup

Information security wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Computer security wikipedia , lookup

Transcript
Emerging Security Trends & Technologies
Presented by
Santhosh Koratt
Head Consulting & Compliance
SecureSynergy Pvt.Ltd.
Aim
 Highlight key security trends for the
coming years
 Discuss the information risk management
solutions from a technology front
TELECOM
BANKING
IT
RETAIL
 To give a practical view of integrated
security infrastructure
“We are in the initial years of technology innovation
and growth, namely, IT Everywhere”
Source: Forrester Research
PHARMA
Security Trends & Technologies
Converged Endpoint Security
 Multiple point solutions
 Poor visibility & control
 Compliance requirements
 High cost of management
 Emergence of holistic end point security
 Endpoint security suites comprising
Antivirus, Antispyware, Host-based IPS,
Email Security & Network Access Control
 Industry is moving towards Single Agent Single Console concept
Converged Endpoint Security
Data Loss Prevention
 Unauthorized transfer of data to
external devices
 Growing insider attacks
 Loss of data via Web & E-mail
 Privacy regulations
 Emphasis on Data discovery
&classification
 Solutions at host & perimeter levels
 Policy based control
Data Loss Prevention
Information Rights Management
• Growing outsourced relationships
• Need to look beyond NDA
•
Information Rights Management
Mobile Device Security
 Increasing connected mobile workforce
 Lot of critical data on mobile devices
 Physical theft prone devices
 Full disclousure norms & compliance
mandates
 Acceptance of full disk encryption
 Maturing technology
Mobile Devices: “the most severe and
overlooked threat to the enterprise,”
Gartner Group
Secure Software Engineering
• Microsoft Patch Tuesday
• Increasing VA/ PT adoption & costs
• Hacktivism
•
A secure product is one that protects the confidentiality, integrity, and availability of the
customers’ information, and the integrity and availability of processing resources under
control of the system’s owner or administrator.
Source: Writing Secure Code (Microsoft.com)
Secure Software Engineering
Integrated Network Security
•
•
Integrated Network Security
Centralized Entitlement Management
•
•
IT Enabled Physical Security
•
•
Compliance Management
•
•