SlideShare a Scribd company logo
2015  A  YEAR  IN  REVIEW  
2016  PREDICTIONS
NSS	
  Labs	
  Research	
  
December	
  9,	
  2015
Jason	
  Pappalexis,	
  
Research	
  Director
Andrew	
  Braunberg,	
  
Research	
  VP	
  
Mike	
  Spanbauer,	
  
Research	
  VP
Slide	
  2
NSS  Labs  Experts
Andrew	
  Braunberg
Research	
  VP	
  
Jason	
  Pappalexis
Research	
  Director
Mike	
  Spanbauer
VP,	
  Research
Slide	
  3
Agenda
• The	
  Need	
  for	
  Independent	
  Testing
• 2015	
  Security	
  Year	
  in	
  Review
• 2016	
  Security	
  Predictions
• Q&A
Slide	
  4
NSS  Labs
The	
  World’s	
  Leading	
  Security	
  Insight	
  Company	
  
Slide	
  5
2015  Year  in  Review
• State	
  sponsored	
  breaches	
  causing	
  serious	
  fear,	
  friction
• Public	
  disclosure	
  of	
  breaches,	
  particularly	
  OPM,	
  driving	
  need	
  for	
  response
• German	
  Steel	
  Mill	
  hacked,	
  disabled
• DHS	
  performing	
  penetration	
  tests	
  
• End	
  of	
  European	
  Safe	
  Harbor	
  Agreement
Information	
  Security	
  and	
  Privacy	
  as	
  Global	
  Business	
  and	
  National	
  Security	
  Issues
CYBER-­‐ATTACKERS	
  MOVE	
  FASTER	
  THAN	
  DEFENDERS
Slide	
  6
2015  Year  in  Review  
• Innovation:	
  Markets	
  that	
  are	
  Punching	
  above	
  their	
  Weight	
  Class
• BDS	
  
• CASB
• Endpoint
• Security	
  Intelligence
• Investment:	
  Huge	
  interest	
  from	
  VC	
  community
• In	
  the	
  last	
  two	
  years,	
  investors	
  have	
  staked	
  $4.6billion	
  into	
  cybersecurity	
  startups
• Consolidation
• NGFW	
  is	
  a	
  maturing	
  market	
  – absorbing	
  adjacent	
  technologies
• Trend	
  Micro	
  picks	
  up	
  TippingPoint from	
  HP
• Intel	
  Security	
  sells	
  off	
  Stonesoft	
  assets	
  to	
  Raytheon|Websense
• Point	
  product	
  acquisitions	
  in	
  numerous	
  markets
Security	
  Markets:	
  Innovation,	
  Investment,	
  and	
  Consolidation
Slide	
  7
2015  Exploit  Kits  Observed
Active	
  exploit	
  kits
delivered
38,787
unique	
  exploits
• Angler
• Magnitude
• Neutrino
• Sweet	
  Orange
• Styx
• Blackhole
• Gong	
  Dad
• Nuclear
• Flash	
  Pack
• Rig
• Kaixin
• Fiesta
• Goon/Infinity
Slide	
  8
2016  Predictions
• Nation	
  state	
  détente?	
  Or	
  Smoke	
  and	
  mirror?
• Behavior	
  will	
  only	
  change	
  when	
  national	
  interests	
  do
• More	
  U.S.	
  Federal	
  policy	
  unlikely	
  in	
  election	
  year
• Encryption/privacy	
  is	
  politically	
  sensitive
• Security	
  as	
  a	
  board	
  of	
  directors	
  level	
  issue	
  
• Cyber	
  Insurance	
  as	
  risk	
  transfer
• Limiting	
  data	
  collection	
  as	
  risk	
  reduction
• Focus	
  increasingly	
  on	
  data	
  integrity	
  (incredibly	
  important	
  for	
  IoT)
• Safe	
  Habor “fix”	
  leads	
  to	
  increased	
  data	
  localization
Security	
  and	
  Privacy	
  Increasingly	
  Intertwined	
  with	
  Broader	
  Global	
  Issues
Slide	
  9
2016  Predictions
• Trends	
  in	
  portfolio	
  consolidation
• Dell	
  and	
  EMC	
  merger,	
  what	
  is	
  the	
  implication?
• Symantec	
  – what	
  would	
  you	
  buy	
  with	
  $US	
  billions?
• Who	
  wins	
  in	
  NGFW	
  with	
  the	
  perimeter	
  dissolving?
• #	
  of	
  $US	
  billion	
  security	
  valuations	
  (and	
  rising!)
• Pure	
  play	
  functionality	
  needs	
  to	
  be	
  able	
  to	
  integrate	
  into	
  larger	
  suites	
  
of	
  solutions
Consolidations	
  Continue	
  as	
  Does	
  Adoption	
  of	
  Federated	
  Models
Slide	
  10
2016  Predictions
Security	
  Products
• The	
  emperor	
  wears	
  no	
  clothes	
  – Next	
  Generation
• Integration	
  becomes	
  key	
  selection	
  criteria	
  (an	
  API	
  isn’t	
  sufficient)
• SIEM(ply	
  not	
  working)	
   – product	
  consolidation
• Growth	
  of	
  web	
  application	
  security
Virtual	
  Infrastructure
• March	
  to	
  cloud	
  computing	
   continues,	
  accelerating	
  service	
  aggregation	
  (including	
   MSSP)
• SDN	
  growth	
  and	
  security	
  as	
  an	
  NFV	
  use	
  case
Threats
• Growth	
  of	
  mobile	
  specific	
  APTs
• IoT	
  Security	
  Issues	
  get	
  real
New	
  Look	
  at	
  Pre-­‐emptive,	
  Preventive	
  	
  Security	
  Products
Slide	
  11
Advice
• Know	
  the	
  threats,	
  know	
  your	
  apps
• It’s	
  not	
  the	
  98%	
  you	
  catch,	
  it’s	
  the	
  2%	
  you	
  miss
• Best	
  Practices	
  
• Continuous	
  monitoring
• CAWS	
  community	
  is	
  available	
  for	
  free
There	
  is	
  no	
  “done”	
  with	
  security
Slide	
  12
Questions?
Market	
  Analysis
Buyers	
  Guides
Company	
  Reports
Technical	
  Briefs Test	
  Reports
Comparatives	
  Reports
• Security	
  Value	
  Map	
  
• TCO	
  
• Security	
  
• Performance
Product	
   Test	
  Reports
Thank  you!
For  more  information  contact
sales@nsslabs.com

More Related Content

PDF
Outpost24 webinar - A day in the life of an information security professional
PDF
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps
PPTX
Outpost24 webinar: Risk-based approach to security assessments
PDF
Outpost24 Webinar - Common wireless security threats and how to avoid them
PDF
Outpost24 webinar - Mastering the art of multicloud security
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
PDF
Acronis Active Protection: A Way To Combat Ransomware Attack
PPTX
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Outpost24 webinar - A day in the life of an information security professional
ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Implications when migrating to a Zero Trust model
Acronis Active Protection: A Way To Combat Ransomware Attack
David Tweedale - The Evolving Threat Landscape #midscybersecurity18

What's hot (20)

PPTX
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
PDF
Outpost24 webinar - Busting the myths of cloud security
PDF
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
PPTX
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
PDF
Infographic: 5 Tips for Approaching Customers About Cloud Security
PPTX
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PPTX
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
PPT
Storage Made Easy Cloud Control Gateway Overview
PPTX
The Top 7 Causes of Major Security Breaches
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PPT
Cis 550-week-10-term-paper
PPTX
Securing a great Developer Experience - v1.3
PPTX
Infosec Europe 2017 Highlights | Lastline, Inc.
PDF
Container Security: What Enterprises Need to Know
PPTX
An Inside-Out Approach to Security in Financial Services
PDF
Top 5 Cloud Security Predictions for 2016
PDF
What your scanner isn't telling you
PDF
The view of auditor on cybercrime
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Outpost24 webinar - Busting the myths of cloud security
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Infographic: 5 Tips for Approaching Customers About Cloud Security
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Outpost24 webinar: Security Analytics: what's in a risk score
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Storage Made Easy Cloud Control Gateway Overview
The Top 7 Causes of Major Security Breaches
Outpost24 Webinar - Creating a sustainable application security program to dr...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Cis 550-week-10-term-paper
Securing a great Developer Experience - v1.3
Infosec Europe 2017 Highlights | Lastline, Inc.
Container Security: What Enterprises Need to Know
An Inside-Out Approach to Security in Financial Services
Top 5 Cloud Security Predictions for 2016
What your scanner isn't telling you
The view of auditor on cybercrime
Ad

Viewers also liked (16)

PDF
NGFW: MARKET GROWTH, DEPLOYMENTS, AND NSS TEST RESULTS
PDF
Is Your Security Blind to SSL/TSL?
PDF
DDoS Prevention: Market Growth, Deployments, and NSS Test Results
PDF
NGIPS Market Trends and Group Test Results
PPT
Chapter 3: Information Security Framework
PPTX
The State Of Information and Cyber Security in 2016
PDF
Breach Detection Systems: What Are They and Do You Need One?
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPT
FireEye
PDF
Fire Eye Appliance Quick Start
PPTX
Symantec - State of European Data Privacy
PPTX
Security models for security architecture
PDF
FireEye Use Cases — FireEye Solution Deployment Experience
PPTX
Build an Information Security Strategy
PDF
Enterprise Security Architecture
PDF
Unit of Value: A Framework for Scaling
NGFW: MARKET GROWTH, DEPLOYMENTS, AND NSS TEST RESULTS
Is Your Security Blind to SSL/TSL?
DDoS Prevention: Market Growth, Deployments, and NSS Test Results
NGIPS Market Trends and Group Test Results
Chapter 3: Information Security Framework
The State Of Information and Cyber Security in 2016
Breach Detection Systems: What Are They and Do You Need One?
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
FireEye
Fire Eye Appliance Quick Start
Symantec - State of European Data Privacy
Security models for security architecture
FireEye Use Cases — FireEye Solution Deployment Experience
Build an Information Security Strategy
Enterprise Security Architecture
Unit of Value: A Framework for Scaling
Ad

Similar to NSS Labs’ 2016 Information Security Predictions (20)

PPTX
2016 virus bulletin
PPTX
cloud security ppt
PPTX
Cloud Security
PPTX
Cloud Security
PDF
Single Realm Multi-Cloud Security Management with Palo Alto Networks
PPTX
Cloud security ppt
PDF
Open Source models security- Supply chain
PPTX
Solnet dev secops meetup
PDF
Thin Air or Solid Ground? Practical Cloud Security
PDF
Itmgen 4317 security
PPTX
Cyber Security: Threats and Needed Actions
PDF
Rothke - A Pragmatic Approach To Purchasing Information Security Products
PPTX
CSA Atlanta Q1'2016 Chapter Meeting
PDF
Cloud Innovation Tour - Discover Track
PDF
Infonetics Network and Content Security Vendor Scorecard
PDF
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
PPTX
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
PDF
Cyber Security in Manufacturing
PPTX
Nonprofit IT Trends 2018
2016 virus bulletin
cloud security ppt
Cloud Security
Cloud Security
Single Realm Multi-Cloud Security Management with Palo Alto Networks
Cloud security ppt
Open Source models security- Supply chain
Solnet dev secops meetup
Thin Air or Solid Ground? Practical Cloud Security
Itmgen 4317 security
Cyber Security: Threats and Needed Actions
Rothke - A Pragmatic Approach To Purchasing Information Security Products
CSA Atlanta Q1'2016 Chapter Meeting
Cloud Innovation Tour - Discover Track
Infonetics Network and Content Security Vendor Scorecard
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Cyber Security in Manufacturing
Nonprofit IT Trends 2018

Recently uploaded (20)

PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Hybrid model detection and classification of lung cancer
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
A Presentation on Touch Screen Technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Chapter 5: Probability Theory and Statistics
PDF
August Patch Tuesday
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
project resource management chapter-09.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Zenith AI: Advanced Artificial Intelligence
Web App vs Mobile App What Should You Build First.pdf
Hybrid model detection and classification of lung cancer
Group 1 Presentation -Planning and Decision Making .pptx
DP Operators-handbook-extract for the Mautical Institute
A Presentation on Touch Screen Technology
Building Integrated photovoltaic BIPV_UPV.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Chapter 5: Probability Theory and Statistics
August Patch Tuesday
Encapsulation_ Review paper, used for researhc scholars
Univ-Connecticut-ChatGPT-Presentaion.pdf
project resource management chapter-09.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
OMC Textile Division Presentation 2021.pptx
Assigned Numbers - 2025 - Bluetooth® Document
NewMind AI Weekly Chronicles - August'25-Week II
Zenith AI: Advanced Artificial Intelligence

NSS Labs’ 2016 Information Security Predictions

  • 1. 2015  A  YEAR  IN  REVIEW   2016  PREDICTIONS NSS  Labs  Research   December  9,  2015 Jason  Pappalexis,   Research  Director Andrew  Braunberg,   Research  VP   Mike  Spanbauer,   Research  VP
  • 2. Slide  2 NSS  Labs  Experts Andrew  Braunberg Research  VP   Jason  Pappalexis Research  Director Mike  Spanbauer VP,  Research
  • 3. Slide  3 Agenda • The  Need  for  Independent  Testing • 2015  Security  Year  in  Review • 2016  Security  Predictions • Q&A
  • 4. Slide  4 NSS  Labs The  World’s  Leading  Security  Insight  Company  
  • 5. Slide  5 2015  Year  in  Review • State  sponsored  breaches  causing  serious  fear,  friction • Public  disclosure  of  breaches,  particularly  OPM,  driving  need  for  response • German  Steel  Mill  hacked,  disabled • DHS  performing  penetration  tests   • End  of  European  Safe  Harbor  Agreement Information  Security  and  Privacy  as  Global  Business  and  National  Security  Issues CYBER-­‐ATTACKERS  MOVE  FASTER  THAN  DEFENDERS
  • 6. Slide  6 2015  Year  in  Review   • Innovation:  Markets  that  are  Punching  above  their  Weight  Class • BDS   • CASB • Endpoint • Security  Intelligence • Investment:  Huge  interest  from  VC  community • In  the  last  two  years,  investors  have  staked  $4.6billion  into  cybersecurity  startups • Consolidation • NGFW  is  a  maturing  market  – absorbing  adjacent  technologies • Trend  Micro  picks  up  TippingPoint from  HP • Intel  Security  sells  off  Stonesoft  assets  to  Raytheon|Websense • Point  product  acquisitions  in  numerous  markets Security  Markets:  Innovation,  Investment,  and  Consolidation
  • 7. Slide  7 2015  Exploit  Kits  Observed Active  exploit  kits delivered 38,787 unique  exploits • Angler • Magnitude • Neutrino • Sweet  Orange • Styx • Blackhole • Gong  Dad • Nuclear • Flash  Pack • Rig • Kaixin • Fiesta • Goon/Infinity
  • 8. Slide  8 2016  Predictions • Nation  state  détente?  Or  Smoke  and  mirror? • Behavior  will  only  change  when  national  interests  do • More  U.S.  Federal  policy  unlikely  in  election  year • Encryption/privacy  is  politically  sensitive • Security  as  a  board  of  directors  level  issue   • Cyber  Insurance  as  risk  transfer • Limiting  data  collection  as  risk  reduction • Focus  increasingly  on  data  integrity  (incredibly  important  for  IoT) • Safe  Habor “fix”  leads  to  increased  data  localization Security  and  Privacy  Increasingly  Intertwined  with  Broader  Global  Issues
  • 9. Slide  9 2016  Predictions • Trends  in  portfolio  consolidation • Dell  and  EMC  merger,  what  is  the  implication? • Symantec  – what  would  you  buy  with  $US  billions? • Who  wins  in  NGFW  with  the  perimeter  dissolving? • #  of  $US  billion  security  valuations  (and  rising!) • Pure  play  functionality  needs  to  be  able  to  integrate  into  larger  suites   of  solutions Consolidations  Continue  as  Does  Adoption  of  Federated  Models
  • 10. Slide  10 2016  Predictions Security  Products • The  emperor  wears  no  clothes  – Next  Generation • Integration  becomes  key  selection  criteria  (an  API  isn’t  sufficient) • SIEM(ply  not  working)   – product  consolidation • Growth  of  web  application  security Virtual  Infrastructure • March  to  cloud  computing   continues,  accelerating  service  aggregation  (including   MSSP) • SDN  growth  and  security  as  an  NFV  use  case Threats • Growth  of  mobile  specific  APTs • IoT  Security  Issues  get  real New  Look  at  Pre-­‐emptive,  Preventive    Security  Products
  • 11. Slide  11 Advice • Know  the  threats,  know  your  apps • It’s  not  the  98%  you  catch,  it’s  the  2%  you  miss • Best  Practices   • Continuous  monitoring • CAWS  community  is  available  for  free There  is  no  “done”  with  security
  • 12. Slide  12 Questions? Market  Analysis Buyers  Guides Company  Reports Technical  Briefs Test  Reports Comparatives  Reports • Security  Value  Map   • TCO   • Security   • Performance Product   Test  Reports
  • 13. Thank  you! For  more  information  contact sales@nsslabs.com