SlideShare a Scribd company logo
Outlook Briefing 2016:
Cyber Security
Charles Lim
Senior Industry Analyst, Cyber Security - Digital Transformation Practice
Frost & Sullivan Asia Pacific
Charles.Lim@frost.com
2
What happens in an Internet minute?
Proliferation of Cyber Attacks in 2015 targeted popular services
Data is the new gold, inability to secure them leads to distrust in services
3
Uber accounts have been
hacked and are being used to
secure rides in China without
their consent or knowledge
Apple had to remove more than
300 apps from its app store
infected by xCodeGhost malware,
affecting 500 million users
In the week of Black Friday,
Amazon has reportedly begun
forcibly resetting some users’
passwords over concerns
about a major breach.
54% of security professionals view
social engineering attacks through
phishing emails as the top threat
technique that they have encountered
Over one thousand email
addresses and passwords from
Spotify were possibly leaked
LinkedIn encountered a major breach of its
password database - a file containing passwords
using “linkedin” appeared in an online forum
A security researcher discovered a way to
perform remote code execution and retrieve
confidential data from Instagram and Facebook
Twitter emailed more than 20 users,
warning them they may have been
targeted by hackers ‘possibly
associated with a government’
A Vine star who makes
£2,000 per second from
his posts claims he has
been hacked, with all of his
videos deleted from his
account
Google Malaysia’s site
was hacked; visitors
were re-directed to a
hacker’s webpage
Hackers claiming to be
working on behalf of ISIS took
over the Twitter and
YouTube accounts of the
United States Central
Command
All of these attacks occurred in 2015
Compromised Skype users reported
that malicious links and messages were
sent to their contact list
Cyber attacks – fueling the international crime scene, online
100MMore than 100 million
health care records
compromised in 2015.
Medical records are worth
10 times more than credit
card information in the
dark web.
Cyber attacks – the channel for making a statement
602GbpsOn 31st Dec 2015, BBC received a
602Gbps Distributed Denial of Service
(DDoS) attack, the highest ever
recorded in history.
New World Hacking, who claimed
responsibility announced that it was a
test of their power. Their main target
are ISIS websites.
25GB LEAKEDThe Impact Team stole more than 25GB user data
from adultery website, Ashley Madison and released
the information on 18th August 2015.
The original intention was to force Avid Life Media to
shut down the website, and stop online adultery.
“Indonesia experiences around 50,000 cyber attacks every day. That makes
it the second-most targeted country for cyber attack after Vietnam.”
- Yono Reksoprodj, advisor to Minister for Political, Legal and Security Affairs Tedjo Edhy Purdijatno
Speaking on Indonesia’s National Cyber Agency 8th Jun 2015
>50,000 ATTACKS
“We don’t believe any cyberdefense is fail proof. But a strong, well
thought out strategy, coupled with a rapid ability for a bank to understand
when its systems have been maliciously penetrated and swiftly take the
necessary actions, such as isolating the attack, is key to a successful
cybersecurity strategy.”
- Stuart Plesser, Standard & Poor’s
Press statement pertaining to possible downgrade of banks’ ratings,
if it is believed to be ill-prepared to withstand cyber attacks.
7
The need to focus on Industrial Control Systems Security as priority
8
Security Challenges within Internet of Things
Source: Frost & Sullivan
Connected cars has been
proven to be hacked in
recent times, however the
actual impact is to the
driver’s safety and are at a
very nascent stage of
security that is acted now by
automobile manufacturers.
Connected homes, which
are developed with the
use of smart consumer
appliances such as
wireless fridges, lighting,
and thermostats have
limited impacts and are
not desirable targets.
Industrial Control Systems, which
automates most critical infrastructures
are now going through an active
transformation to connect to the Internet,
and have been victims of attacks,
extortion where any successful attack
will cause a severe impact to citizens
nationwide.
Cyber Attacks Shift Towards Physical Systems
Industrial Control Systems in operational technology creating new points of vulnerabilities
9
97%
3%
Number of Internet-connected ICS devices,
August 2015, Asia Pacific
Connected Devices
Vulnerable Devices
Source: Asia-Pacific Industrial Control Systems Security Report, Frost & Sullivan
N=3087
BLACKOUTto thousands of homes in Western Ukraine,
using the BlackEnergy malware to attack
electric substations. it was reportedly
developed by Moscow-backed group,
Sandworm on 23rd Dec 2015.
Subsequently, its Kiev Airport was attacked
by the same malware during Jan 2016.
Investigations are ongoing.
Case analysis – Industrial Control Systems Security
The need to protect SCADA (Supervisory Control and Data Acquisition) systems beyond
the “air gap” concept has been elevated since the 2011 Stuxnet APT attack. Critical
infrastructures using ICS systems and needs to raise the awareness and knowhow of how
to protect these systems as a priority when these systems get connected to the Internet.
Present:
“Air Gap”
Future:
The Internet
Human Machine Interface (HMI)
SCADA,
PLCS
Speed: 500 r/min
Business networks,
connected to the Internet
Industrial networks that runs on
local area networks separated
from the Internet, however still
vulnerable to attacks
Stuxnet malware
installed in USB
drive
External
contractors’
laptop
Information Technology Operational Technology
Graphic source: Vector Open Stock 10Source: Frost & Sullivan
Operationalizing the 3C’s for Cyber Security
Cyber Resilience
Risks & Business
Impacts
Cyber Intelligence
Knowledge and correlation of all
threats in the organization
Cyber Protection
Building the right prevention base
“Security by Design”
11Source: Frost & Sullivan
Threat Response Adaptive Core Ecosystem (TRACE): Identifying the essentials
Frost & Sullivan believes that adopting a platform approach can operationalize
the vision of a holistic security strategy, comprising the right balance between
security mindsets, tools and skill sets.
Access Management Endpoints Web Assets Cloud App
Security
Content
Integrated Security
Appliances
Advanced Threat
Prevention
Human Factor
Mitigation
Vulnerability
Management
Security
Analytics
T R A C E
12
Source: Frost & Sullivan
Projected growth of security solutions in ASEAN, CY2015 (CAGR=20.8%)
Managed Security Services Market Forecast Analysis
-
5.0
10.0
15.0
20.0
25.0
30.0
0.0
100.0
200.0
300.0
400.0
500.0
600.0
2014 2015 2016 2017 2018 2019 2020
Revenue($Million)
GrowthRate(%)
Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
Projected growth of security solutions in Indonesia, CY2015 (CAGR=27.1%)
Managed Security Services Market Forecast Analysis
-
5.0
10.0
15.0
20.0
25.0
30.0
35.0
40.0
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
2014 2015 2016 2017 2018 2019 2020
Revenue($Million)
GrowthRate(%)
Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
Network security adoption in Southeast Asia
0.0 20.0 40.0 60.0 80.0 100.0 120.0
Rest of
ASEAN
Philippines
Vietnam
Thailand
Indonesia
Malaysia
Singapore
CY2015 Q3 YTD
CY2014 Total
Network Security Tracker, 2015 QTD Market Size (US$, M)
Indonesia achieved one of the highest growth rates at 30% YoY (Q3 QTD)
Indonesia
Network Security, Indonesia (US$, M)
2014 Q3 QTD 2015 Q3 QTD
N = 13,930 qualified information security professionals globally. 10% of
respondents are Asia Pacific
44%
49%
52%
72%
75%
Automated identity management
software
Web security applications
Policy management and audit tools
Improved intrusion detection and
prevention technologies
Network monitoring and intelligence
Top 5 Technologies that Significantly Improve Security
(Percent of Survey Respondents)
18%
23%
35%
Use of Advanced Analytics for
Detection of Advanced Malware
(Percent of Survey
Respondents)
No Plans
Evaluating or Selecting a Solution(s)
Implemented or Implementing
2015 (ISC)2 Global information Security Workforce Study
by Frost & Sullivan
17
“How do you really handle all these… big data?”
- VP for Security Infrastructure, leading telco provider, Indonesia
“We have figured out using using our own designed algorithms across
collected logs, to decipher insider threats”
- Chief Security Officer, leading technology vendor
Opinions from the ground
Observation of trends in Security Analytics market
Observations in the security analytics players in APAC
Sold off their IPS offerings, may focus
in other enterprise security products
such as SIEM tools
Integration with endpoint security,
correlation of packets and logs
Launch of X-force exchange,
integration of product and services
business units
Observation of trends in Security Analytics market
Observations in the security analytics / threat intelligence players in APAC
Focus on forensics and incident
response capabilities
User behavior analytics using
machine learning systems and
algorithms to identify fraud
Correlation of business and
security intelligence. Position to
block against APT attacks
Empowering the cyber defenses in Indonesia
Frost & Sullivan’s End User Research and Advisory Practice
Circular, 4G LTE Vulnerability
Research papers – Frost
Industry Quotient (FIQ) and
Market insights
Threat Intelligence AlertsCyber Security Threats and
Solutions Briefings
Cyber Security Outlook for 2016
Building the required capabilities for Cyber Resiliency
21
Improve Cyber
Defense in Critical
Infrastructures
1
Human expertise
and foster
collaboration
2
• Increase of Cyber Security Operation Centers in
the Critical infrastructures.
• Compliance guidelines to ensure cyber resiliency
in both business (IT) and operations (OT)
3
How companies are respondingHow companies are responding
• Cyber security training
• Sharing of intelligence amongst industries
• Setting up cyber security committees
Build a holistic
defense beyond the
organization
• Vendors/contractors to meet security
standards in the process of mitigating chain-
of-trust attacks.
Cyber Security Outlook for 2016
Building the required capabilities for Cyber Resiliency
22
Investments into
analytics to improve
accuracy and speed
4
5
• Big data analytics for multiple sources of threat
feeds will become the common concern and
more accurate judgment through automated
algorithms will be needed.
6
How companies are respondingHow companies are responding
• Enterprises will switch from ‘adopting cyber
security for their cloud setup’ to ‘adopting
cloud as part of their cyber security strategy’.
Convergence
security concepts to
be introduced
• Convergence of threats & detection of fraud
between physical and cyber systems
• Developments of convergence security in
smart cities.
Adopting cloud
security as a
strategy
Frost & Sullivan, the Growth Partnership Company, works in collaboration with
clients to leverage visionary innovation that addresses the global challenges and
related growth opportunities that will make or break today’s market participants.
For more than 50 years, we have been developing growth strategies for the
Global 1000, emerging businesses, the public sector and the investment
community. Is your organization prepared for the next profound wave of industry
convergence, disruptive technologies, increasing competitive intensity, Mega
Trends, breakthrough best practices, changing customer dynamics and emerging
economies?
www.frost.com

More Related Content

PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
PDF
The IBM X-Force 2016 Cyber Security Intelligence Index
PPTX
2016 - Cyber Security for the Public Sector
PPTX
Securing the Cloud
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPTX
The State Of Information and Cyber Security in 2016
PDF
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
PDF
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
The IBM X-Force 2016 Cyber Security Intelligence Index
2016 - Cyber Security for the Public Sector
Securing the Cloud
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
The State Of Information and Cyber Security in 2016
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi

What's hot (20)

PPTX
2015 Cybercrime Trends – Things are Going to Get Interesting
PDF
Cybersecurity in Banking Sector
PPTX
Enterprise Cyber Security 2016
PDF
Top Cyber Security Trends for 2016
PDF
Cyber Security Threats and Data Breaches
PDF
Key Findings from the 2015 IBM Cyber Security Intelligence Index
PPTX
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
PPTX
2019 Cyber Security Trends
PDF
ICION 2016 - Cyber Security Governance
PDF
Cyber Security and the National Central Banks
PPTX
Introduction to Cyber Security
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
PPT
Breaking down the cyber security framework closing critical it security gaps
PDF
Cybersecurity | Risk. Impact. Innovations.
PPTX
Top 5 Cybersecurity Trends in 2021 and Beyond
PPT
The Future of Cyber Security
PDF
Palo Alto Networks 2016 Cybersecurity Predictions
PDF
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
2015 Cybercrime Trends – Things are Going to Get Interesting
Cybersecurity in Banking Sector
Enterprise Cyber Security 2016
Top Cyber Security Trends for 2016
Cyber Security Threats and Data Breaches
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
2019 Cyber Security Trends
ICION 2016 - Cyber Security Governance
Cyber Security and the National Central Banks
Introduction to Cyber Security
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Breaking down the cyber security framework closing critical it security gaps
Cybersecurity | Risk. Impact. Innovations.
Top 5 Cybersecurity Trends in 2021 and Beyond
The Future of Cyber Security
Palo Alto Networks 2016 Cybersecurity Predictions
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Ad

Viewers also liked (20)

PDF
How to login
PDF
5G Indonesia
PDF
Strategi Menyonsong 5G di Indonesia
PPTX
Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)
PPTX
Connected Agricultural services and internet of things..
PDF
Preparing for the Next Broadband - MBS
PDF
Sejenak di 4G Melompati ke 5G
PPTX
Tor pokja satelit mastel
PPTX
Seoul | Jun-15 | Smart Villages Agenda & Concept
PPTX
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...
PDF
5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah
PDF
RSVP Mastel.id
PPTX
Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015
PDF
Smart Education in Korea
PPTX
Smart village model
PPT
Smart village through convergence ppt
PPTX
Hyderabad | Sep-16 | What is a Smart Village?
PDF
Activating 5G Research in Indonesia
PDF
ICT Outlook 2016
PPSX
Smart class education
How to login
5G Indonesia
Strategi Menyonsong 5G di Indonesia
Perkembangan dan Prospek Sektor Teknologi Informasi dan Telekomunikasi (TIK)
Connected Agricultural services and internet of things..
Preparing for the Next Broadband - MBS
Sejenak di 4G Melompati ke 5G
Tor pokja satelit mastel
Seoul | Jun-15 | Smart Villages Agenda & Concept
Agri-IoT: A Semantic Framework for Internet of Things-enabled Smart Farming A...
5G Emergence and Regulatory Challenges - DG PPI - Prof. Kalamullah
RSVP Mastel.id
Masukan pokja smart_fisherysmartplantationsmartfarmer_mastel_juni_2015
Smart Education in Korea
Smart village model
Smart village through convergence ppt
Hyderabad | Sep-16 | What is a Smart Village?
Activating 5G Research in Indonesia
ICT Outlook 2016
Smart class education
Ad

Similar to Outlook Briefing 2016: Cyber Security (20)

PDF
Cyber Security in Manufacturing
PDF
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
PDF
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
PDF
2017 InfraGard Atlanta Conference - Matthew Rosenquist
PDF
Improve network safety through better visibility – Netmagic
PPTX
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
PDF
idg_secops-solutions
PDF
Cyber security for ia and risk 150601
PDF
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
PDF
Cloudy Wpcybersecurity
PPTX
Cyber risks in supply chains
PPTX
Showreel ICSA Technology Conference
PDF
Top 10 Cybersecurity Predictions for 2015
PDF
Data security in cloud
PDF
Conférence ENGIE ACSS 2018
PDF
Fall2015SecurityShow
PPTX
Critical Infrastructure Security by Subodh Belgi
PDF
How Cyber Resilient are we?
PDF
Power Plants Security Webinar Presentation
PDF
NACCTFO Cyber Security Presentation 2014 New Orleans
Cyber Security in Manufacturing
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
2017 InfraGard Atlanta Conference - Matthew Rosenquist
Improve network safety through better visibility – Netmagic
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
idg_secops-solutions
Cyber security for ia and risk 150601
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Cloudy Wpcybersecurity
Cyber risks in supply chains
Showreel ICSA Technology Conference
Top 10 Cybersecurity Predictions for 2015
Data security in cloud
Conférence ENGIE ACSS 2018
Fall2015SecurityShow
Critical Infrastructure Security by Subodh Belgi
How Cyber Resilient are we?
Power Plants Security Webinar Presentation
NACCTFO Cyber Security Presentation 2014 New Orleans

More from Mastel Indonesia (17)

PDF
Challenges and Opportunities for ICT Industry in Indonesia 2016
PDF
Indonesia Digital Transformation Outlook Briefing 2016
PDF
Indonesia Digital Transformation Outlook Briefing 2016
PDF
Masukan tentang Kedaulatan Siber NKRI kepada Menkominfo RI
PDF
Company Profile Indosat Ooredoo
PDF
Ovum ZTE Presentation Jakarta
PDF
Next Generation Mobile Broadband @ M-ICT Era
PDF
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
PDF
Hate speech
PDF
Tor pokja menumbuhkembangkan ott nasional
PDF
Proposal pokja-unik-v1.5-rev-mas
PPT
Tor pokja industri aplikasi & konten
PDF
Pokja roadmap industri
PPTX
Masukan pokja smart_citysmartvillage_mastel_juni_2015
PPTX
Masukan pokja indonesia_services_co_mastel_juni_2015
PPTX
Kick off pokja konvergensi
PDF
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung (globally-networked)
Challenges and Opportunities for ICT Industry in Indonesia 2016
Indonesia Digital Transformation Outlook Briefing 2016
Indonesia Digital Transformation Outlook Briefing 2016
Masukan tentang Kedaulatan Siber NKRI kepada Menkominfo RI
Company Profile Indosat Ooredoo
Ovum ZTE Presentation Jakarta
Next Generation Mobile Broadband @ M-ICT Era
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
Hate speech
Tor pokja menumbuhkembangkan ott nasional
Proposal pokja-unik-v1.5-rev-mas
Tor pokja industri aplikasi & konten
Pokja roadmap industri
Masukan pokja smart_citysmartvillage_mastel_juni_2015
Masukan pokja indonesia_services_co_mastel_juni_2015
Kick off pokja konvergensi
Kedaulatan Cyber NKRI di Era Dunia yang Serba Terhubung (globally-networked)

Recently uploaded (20)

PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
Effective_Handling_Information_Presentation.pptx
PPTX
An Unlikely Response 08 10 2025.pptx
PPTX
nose tajweed for the arabic alphabets for the responsive
PDF
Instagram's Product Secrets Unveiled with this PPT
PPTX
Hydrogel Based delivery Cancer Treatment
PPTX
worship songs, in any order, compilation
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PPTX
Relationship Management Presentation In Banking.pptx
PDF
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
PPTX
The Effect of Human Resource Management Practice on Organizational Performanc...
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PPTX
Primary and secondary sources, and history
PPTX
Tour Presentation Educational Activity.pptx
DOCX
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
DOC
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
PPTX
fundraisepro pitch deck elegant and modern
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
Effective_Handling_Information_Presentation.pptx
An Unlikely Response 08 10 2025.pptx
nose tajweed for the arabic alphabets for the responsive
Instagram's Product Secrets Unveiled with this PPT
Hydrogel Based delivery Cancer Treatment
worship songs, in any order, compilation
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
2025-08-10 Joseph 02 (shared slides).pptx
Learning-Plan-5-Policies-and-Practices.pptx
Relationship Management Presentation In Banking.pptx
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
The Effect of Human Resource Management Practice on Organizational Performanc...
oil_refinery_presentation_v1 sllfmfls.pdf
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
Primary and secondary sources, and history
Tour Presentation Educational Activity.pptx
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
fundraisepro pitch deck elegant and modern

Outlook Briefing 2016: Cyber Security

  • 1. Outlook Briefing 2016: Cyber Security Charles Lim Senior Industry Analyst, Cyber Security - Digital Transformation Practice Frost & Sullivan Asia Pacific Charles.Lim@frost.com
  • 2. 2 What happens in an Internet minute?
  • 3. Proliferation of Cyber Attacks in 2015 targeted popular services Data is the new gold, inability to secure them leads to distrust in services 3 Uber accounts have been hacked and are being used to secure rides in China without their consent or knowledge Apple had to remove more than 300 apps from its app store infected by xCodeGhost malware, affecting 500 million users In the week of Black Friday, Amazon has reportedly begun forcibly resetting some users’ passwords over concerns about a major breach. 54% of security professionals view social engineering attacks through phishing emails as the top threat technique that they have encountered Over one thousand email addresses and passwords from Spotify were possibly leaked LinkedIn encountered a major breach of its password database - a file containing passwords using “linkedin” appeared in an online forum A security researcher discovered a way to perform remote code execution and retrieve confidential data from Instagram and Facebook Twitter emailed more than 20 users, warning them they may have been targeted by hackers ‘possibly associated with a government’ A Vine star who makes £2,000 per second from his posts claims he has been hacked, with all of his videos deleted from his account Google Malaysia’s site was hacked; visitors were re-directed to a hacker’s webpage Hackers claiming to be working on behalf of ISIS took over the Twitter and YouTube accounts of the United States Central Command All of these attacks occurred in 2015 Compromised Skype users reported that malicious links and messages were sent to their contact list
  • 4. Cyber attacks – fueling the international crime scene, online 100MMore than 100 million health care records compromised in 2015. Medical records are worth 10 times more than credit card information in the dark web.
  • 5. Cyber attacks – the channel for making a statement 602GbpsOn 31st Dec 2015, BBC received a 602Gbps Distributed Denial of Service (DDoS) attack, the highest ever recorded in history. New World Hacking, who claimed responsibility announced that it was a test of their power. Their main target are ISIS websites. 25GB LEAKEDThe Impact Team stole more than 25GB user data from adultery website, Ashley Madison and released the information on 18th August 2015. The original intention was to force Avid Life Media to shut down the website, and stop online adultery.
  • 6. “Indonesia experiences around 50,000 cyber attacks every day. That makes it the second-most targeted country for cyber attack after Vietnam.” - Yono Reksoprodj, advisor to Minister for Political, Legal and Security Affairs Tedjo Edhy Purdijatno Speaking on Indonesia’s National Cyber Agency 8th Jun 2015 >50,000 ATTACKS
  • 7. “We don’t believe any cyberdefense is fail proof. But a strong, well thought out strategy, coupled with a rapid ability for a bank to understand when its systems have been maliciously penetrated and swiftly take the necessary actions, such as isolating the attack, is key to a successful cybersecurity strategy.” - Stuart Plesser, Standard & Poor’s Press statement pertaining to possible downgrade of banks’ ratings, if it is believed to be ill-prepared to withstand cyber attacks. 7
  • 8. The need to focus on Industrial Control Systems Security as priority 8 Security Challenges within Internet of Things Source: Frost & Sullivan Connected cars has been proven to be hacked in recent times, however the actual impact is to the driver’s safety and are at a very nascent stage of security that is acted now by automobile manufacturers. Connected homes, which are developed with the use of smart consumer appliances such as wireless fridges, lighting, and thermostats have limited impacts and are not desirable targets. Industrial Control Systems, which automates most critical infrastructures are now going through an active transformation to connect to the Internet, and have been victims of attacks, extortion where any successful attack will cause a severe impact to citizens nationwide.
  • 9. Cyber Attacks Shift Towards Physical Systems Industrial Control Systems in operational technology creating new points of vulnerabilities 9 97% 3% Number of Internet-connected ICS devices, August 2015, Asia Pacific Connected Devices Vulnerable Devices Source: Asia-Pacific Industrial Control Systems Security Report, Frost & Sullivan N=3087 BLACKOUTto thousands of homes in Western Ukraine, using the BlackEnergy malware to attack electric substations. it was reportedly developed by Moscow-backed group, Sandworm on 23rd Dec 2015. Subsequently, its Kiev Airport was attacked by the same malware during Jan 2016. Investigations are ongoing.
  • 10. Case analysis – Industrial Control Systems Security The need to protect SCADA (Supervisory Control and Data Acquisition) systems beyond the “air gap” concept has been elevated since the 2011 Stuxnet APT attack. Critical infrastructures using ICS systems and needs to raise the awareness and knowhow of how to protect these systems as a priority when these systems get connected to the Internet. Present: “Air Gap” Future: The Internet Human Machine Interface (HMI) SCADA, PLCS Speed: 500 r/min Business networks, connected to the Internet Industrial networks that runs on local area networks separated from the Internet, however still vulnerable to attacks Stuxnet malware installed in USB drive External contractors’ laptop Information Technology Operational Technology Graphic source: Vector Open Stock 10Source: Frost & Sullivan
  • 11. Operationalizing the 3C’s for Cyber Security Cyber Resilience Risks & Business Impacts Cyber Intelligence Knowledge and correlation of all threats in the organization Cyber Protection Building the right prevention base “Security by Design” 11Source: Frost & Sullivan
  • 12. Threat Response Adaptive Core Ecosystem (TRACE): Identifying the essentials Frost & Sullivan believes that adopting a platform approach can operationalize the vision of a holistic security strategy, comprising the right balance between security mindsets, tools and skill sets. Access Management Endpoints Web Assets Cloud App Security Content Integrated Security Appliances Advanced Threat Prevention Human Factor Mitigation Vulnerability Management Security Analytics T R A C E 12 Source: Frost & Sullivan
  • 13. Projected growth of security solutions in ASEAN, CY2015 (CAGR=20.8%) Managed Security Services Market Forecast Analysis - 5.0 10.0 15.0 20.0 25.0 30.0 0.0 100.0 200.0 300.0 400.0 500.0 600.0 2014 2015 2016 2017 2018 2019 2020 Revenue($Million) GrowthRate(%) Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
  • 14. Projected growth of security solutions in Indonesia, CY2015 (CAGR=27.1%) Managed Security Services Market Forecast Analysis - 5.0 10.0 15.0 20.0 25.0 30.0 35.0 40.0 0.0 10.0 20.0 30.0 40.0 50.0 60.0 70.0 2014 2015 2016 2017 2018 2019 2020 Revenue($Million) GrowthRate(%) Note: All figures are rounded. The base year is 2013. Source: Frost & Sullivan analysis.
  • 15. Network security adoption in Southeast Asia 0.0 20.0 40.0 60.0 80.0 100.0 120.0 Rest of ASEAN Philippines Vietnam Thailand Indonesia Malaysia Singapore CY2015 Q3 YTD CY2014 Total Network Security Tracker, 2015 QTD Market Size (US$, M) Indonesia achieved one of the highest growth rates at 30% YoY (Q3 QTD) Indonesia Network Security, Indonesia (US$, M) 2014 Q3 QTD 2015 Q3 QTD
  • 16. N = 13,930 qualified information security professionals globally. 10% of respondents are Asia Pacific 44% 49% 52% 72% 75% Automated identity management software Web security applications Policy management and audit tools Improved intrusion detection and prevention technologies Network monitoring and intelligence Top 5 Technologies that Significantly Improve Security (Percent of Survey Respondents) 18% 23% 35% Use of Advanced Analytics for Detection of Advanced Malware (Percent of Survey Respondents) No Plans Evaluating or Selecting a Solution(s) Implemented or Implementing 2015 (ISC)2 Global information Security Workforce Study by Frost & Sullivan
  • 17. 17 “How do you really handle all these… big data?” - VP for Security Infrastructure, leading telco provider, Indonesia “We have figured out using using our own designed algorithms across collected logs, to decipher insider threats” - Chief Security Officer, leading technology vendor Opinions from the ground
  • 18. Observation of trends in Security Analytics market Observations in the security analytics players in APAC Sold off their IPS offerings, may focus in other enterprise security products such as SIEM tools Integration with endpoint security, correlation of packets and logs Launch of X-force exchange, integration of product and services business units
  • 19. Observation of trends in Security Analytics market Observations in the security analytics / threat intelligence players in APAC Focus on forensics and incident response capabilities User behavior analytics using machine learning systems and algorithms to identify fraud Correlation of business and security intelligence. Position to block against APT attacks
  • 20. Empowering the cyber defenses in Indonesia Frost & Sullivan’s End User Research and Advisory Practice Circular, 4G LTE Vulnerability Research papers – Frost Industry Quotient (FIQ) and Market insights Threat Intelligence AlertsCyber Security Threats and Solutions Briefings
  • 21. Cyber Security Outlook for 2016 Building the required capabilities for Cyber Resiliency 21 Improve Cyber Defense in Critical Infrastructures 1 Human expertise and foster collaboration 2 • Increase of Cyber Security Operation Centers in the Critical infrastructures. • Compliance guidelines to ensure cyber resiliency in both business (IT) and operations (OT) 3 How companies are respondingHow companies are responding • Cyber security training • Sharing of intelligence amongst industries • Setting up cyber security committees Build a holistic defense beyond the organization • Vendors/contractors to meet security standards in the process of mitigating chain- of-trust attacks.
  • 22. Cyber Security Outlook for 2016 Building the required capabilities for Cyber Resiliency 22 Investments into analytics to improve accuracy and speed 4 5 • Big data analytics for multiple sources of threat feeds will become the common concern and more accurate judgment through automated algorithms will be needed. 6 How companies are respondingHow companies are responding • Enterprises will switch from ‘adopting cyber security for their cloud setup’ to ‘adopting cloud as part of their cyber security strategy’. Convergence security concepts to be introduced • Convergence of threats & detection of fraud between physical and cyber systems • Developments of convergence security in smart cities. Adopting cloud security as a strategy
  • 23. Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today’s market participants. For more than 50 years, we have been developing growth strategies for the Global 1000, emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies? www.frost.com