State of IT Security

Arun Bhatia
Feb 09, 2012
HP EC1




©2011 Hewlett-Packard Development Company, L.P. The information
contained herein is subject to change without notice
Cost of security breach
Cost of breach - Ponemon 2011 - ~ USD 6.75-7.2 million *

2011 stats - Source: Online Trust Alliance (OTA)
·558 breaches
·126 million records
·76% server exploits
·92% avoidable
·$318 cost per record
·$7.2 million average cost of each breach
·$6.5 billion impact to U.S. businesses

Education (schools and colleges) represented 13% of the incidents, government agencies 15%,
health care providers 29% and business 43%.
Source: Privacy Rights Clearinghouse (PRC)

Most alarming is that 96% were avoidable through simple steps and internal controls.
Source: Verizon 2011 Data Breach Notification report

Two out of five companies that experience a catastrophe or an extended system outage never
resume operations, and of those that do, one-third go out of business within two years”
Source: GartnerGroup

* Cost to individuals could be up to USD 14b
2011 – Year of the hacker
Attack history
• Epsilon, Sony, Citibank, RSA
• SCADA under threat Wikileaks, Diginotar
• 10 days of rain.
• Anonymous, Lulzsec

2102...and its just January
•Zappos
•Symantec code theft
•India MI disclosure
Trends

•Attacks use the allowed ports on the firewall - and use Application/software
vulnerabilities
• Zero day exploits, Underground exploits market
•Corporatization and nationalization of cybercrime.
•Availability of sophisticated automated tools; crimeware
•Commoditization of IT - tablets, smartphones, BYOD
• Corporatization and nationalization of cybercrime - why Russia and the Eastern bloc
•UK ICO, US Critical Infra protection/DHS/Cyber Czar
• APTs, SCADA - Tilded platform (Stuxnet/doqu)
•Hacktivism
•Social networks and Social Engineering
•Piracy and IP - SOPA/PIPA, megaupload, filesonic
•Piracy - Google's policy change
What to expect next ?
•Just literacy is not enough, be careful and be sceptic
      •Opportunities in 2012 - London Olympics, Mayan calendar
•Challenges for corporations and nations - Internet and computing power as means of
collaboration/trade/info sharing/business ….for the bad guys too, APTs again,
politicization of cyber crime
      •Websense labs - almost 50% data loss happens over the web
• Move to https - IDS/IDP, AV etc are left in the dark
•Effects on other industries - financial risk, cyber insurance
•DPA/SOPA/PIPA/ACTA/TPPA, Precise Act, NSTIC, India IT Act of 20xx
•BYOD - the most popular acronym of the year
•Heterogeneous environ
      •Not just MS any more
      •Malware on MAC
      •Blended attacks
•Can I keep all my eggs in (on) the same basket (cloud)?
      •Recent NIST advisory
•Open-everything
•Mobility + Social N/w + Cloud + (NFC etc)
Personal responsibility

•Humans are the weakest link, Security is a people and management problem, Einstein
said…universe and human stupidity is infinite.
•Password change check
•Email text replacement in forums
•Ego-surfing
•Unknown senders
•Bank and work passwords
•Credit card CVC
•Password safes
•Gmail OTP and dashboard
•Truecrypt, Preyproject, TOR Project
Corporate responsibility
•Policy, protection, compliance, IP
• Open discussion - HP sec policy
Thank you

arun.bhatia@hp.com




8   © Copyright 2011 Hewlett-Packard Development Company, L.P.

More Related Content

PDF
InformationSecurity_11141
PDF
Cybersecurity in the Boardroom
PPT
December ISSA Meeting Executive Security Presentation
PPTX
Security Minded - Ransomware Awareness
PPTX
Cybersecurity & the Board of Directors
DOCX
Chapter 8 securing information systems MIS
PDF
Creating cyber forensic readiness in your organisation
PDF
Top 3 security concerns for enterprises
InformationSecurity_11141
Cybersecurity in the Boardroom
December ISSA Meeting Executive Security Presentation
Security Minded - Ransomware Awareness
Cybersecurity & the Board of Directors
Chapter 8 securing information systems MIS
Creating cyber forensic readiness in your organisation
Top 3 security concerns for enterprises

What's hot (19)

PPTX
Software Piracy
PPTX
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
PDF
IDC Best Practices in Private Sector Cyber Security
PDF
chapter 8- Management Information Systems Managing the Digital Firm
PPTX
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
PPT
PDF
Final cyber risk report 24 feb
PPTX
Data data every where!! Thomas O'Grady
PDF
INFOGRAPHIC: The Evolution of Data Privacy
PDF
Top 10 leading fraud detection and prevention solution providers
PDF
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
PPTX
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
PDF
Assignment 1
PDF
Cyber War, Cyber Peace, Stones and Glass Houses
PPTX
Top 12 Threats to Enterprise
PPT
Attitudes to online Privacy and Security
PPTX
Information Security: Effects On Businesses and Consumers
PDF
A Breach Carol: 2013 Review, 2014 Predictions
PPTX
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Software Piracy
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
IDC Best Practices in Private Sector Cyber Security
chapter 8- Management Information Systems Managing the Digital Firm
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Final cyber risk report 24 feb
Data data every where!! Thomas O'Grady
INFOGRAPHIC: The Evolution of Data Privacy
Top 10 leading fraud detection and prevention solution providers
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
Assignment 1
Cyber War, Cyber Peace, Stones and Glass Houses
Top 12 Threats to Enterprise
Attitudes to online Privacy and Security
Information Security: Effects On Businesses and Consumers
A Breach Carol: 2013 Review, 2014 Predictions
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Ad

Similar to State of IT security 2012 (20)

PPTX
Clinton- Cyber IRT Balto 10_2012
PDF
Fall2015SecurityShow
PDF
Omlis Data Breaches Report - An Inside Perspective
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PDF
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
HIS Information Security Introduction.pptx
PDF
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
PDF
Future Watch: Cybersecurity market in South Africa
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
DATA BREACH & PREVENTION - Hemali Rangoliya
PDF
Volume2 chapter1 security
PPTX
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
PPTX
Year of pawnage - Ian trump
PPTX
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
PPTX
Continuing Education Conferance
PPTX
Information Security and Data Breach Trends 2014-2015
Clinton- Cyber IRT Balto 10_2012
Fall2015SecurityShow
Omlis Data Breaches Report - An Inside Perspective
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Art Hathaway - Artificial Intelligence - Real Threat Prevention
11 19-2015 - iasaca membership conference - the state of security
HIS Information Security Introduction.pptx
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
Future Watch: Cybersecurity market in South Africa
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
DATA BREACH & PREVENTION - Hemali Rangoliya
Volume2 chapter1 security
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Year of pawnage - Ian trump
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
Continuing Education Conferance
Information Security and Data Breach Trends 2014-2015
Ad

Recently uploaded (20)

PPT
Geologic Time for studying geology for geologist
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
DOCX
search engine optimization ppt fir known well about this
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
The various Industrial Revolutions .pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
Chapter 5: Probability Theory and Statistics
Geologic Time for studying geology for geologist
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Getting started with AI Agents and Multi-Agent Systems
Flame analysis and combustion estimation using large language and vision assi...
A proposed approach for plagiarism detection in Myanmar Unicode text
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
search engine optimization ppt fir known well about this
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Zenith AI: Advanced Artificial Intelligence
A review of recent deep learning applications in wood surface defect identifi...
The various Industrial Revolutions .pptx
Final SEM Unit 1 for mit wpu at pune .pptx
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
NewMind AI Weekly Chronicles – August ’25 Week III
CloudStack 4.21: First Look Webinar slides
Custom Battery Pack Design Considerations for Performance and Safety
Microsoft Excel 365/2024 Beginner's training
Chapter 5: Probability Theory and Statistics

State of IT security 2012

  • 1. State of IT Security Arun Bhatia Feb 09, 2012 HP EC1 ©2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
  • 2. Cost of security breach Cost of breach - Ponemon 2011 - ~ USD 6.75-7.2 million * 2011 stats - Source: Online Trust Alliance (OTA) ·558 breaches ·126 million records ·76% server exploits ·92% avoidable ·$318 cost per record ·$7.2 million average cost of each breach ·$6.5 billion impact to U.S. businesses Education (schools and colleges) represented 13% of the incidents, government agencies 15%, health care providers 29% and business 43%. Source: Privacy Rights Clearinghouse (PRC) Most alarming is that 96% were avoidable through simple steps and internal controls. Source: Verizon 2011 Data Breach Notification report Two out of five companies that experience a catastrophe or an extended system outage never resume operations, and of those that do, one-third go out of business within two years” Source: GartnerGroup * Cost to individuals could be up to USD 14b
  • 3. 2011 – Year of the hacker Attack history • Epsilon, Sony, Citibank, RSA • SCADA under threat Wikileaks, Diginotar • 10 days of rain. • Anonymous, Lulzsec 2102...and its just January •Zappos •Symantec code theft •India MI disclosure
  • 4. Trends •Attacks use the allowed ports on the firewall - and use Application/software vulnerabilities • Zero day exploits, Underground exploits market •Corporatization and nationalization of cybercrime. •Availability of sophisticated automated tools; crimeware •Commoditization of IT - tablets, smartphones, BYOD • Corporatization and nationalization of cybercrime - why Russia and the Eastern bloc •UK ICO, US Critical Infra protection/DHS/Cyber Czar • APTs, SCADA - Tilded platform (Stuxnet/doqu) •Hacktivism •Social networks and Social Engineering •Piracy and IP - SOPA/PIPA, megaupload, filesonic •Piracy - Google's policy change
  • 5. What to expect next ? •Just literacy is not enough, be careful and be sceptic •Opportunities in 2012 - London Olympics, Mayan calendar •Challenges for corporations and nations - Internet and computing power as means of collaboration/trade/info sharing/business ….for the bad guys too, APTs again, politicization of cyber crime •Websense labs - almost 50% data loss happens over the web • Move to https - IDS/IDP, AV etc are left in the dark •Effects on other industries - financial risk, cyber insurance •DPA/SOPA/PIPA/ACTA/TPPA, Precise Act, NSTIC, India IT Act of 20xx •BYOD - the most popular acronym of the year •Heterogeneous environ •Not just MS any more •Malware on MAC •Blended attacks •Can I keep all my eggs in (on) the same basket (cloud)? •Recent NIST advisory •Open-everything •Mobility + Social N/w + Cloud + (NFC etc)
  • 6. Personal responsibility •Humans are the weakest link, Security is a people and management problem, Einstein said…universe and human stupidity is infinite. •Password change check •Email text replacement in forums •Ego-surfing •Unknown senders •Bank and work passwords •Credit card CVC •Password safes •Gmail OTP and dashboard •Truecrypt, Preyproject, TOR Project
  • 7. Corporate responsibility •Policy, protection, compliance, IP • Open discussion - HP sec policy
  • 8. Thank you arun.bhatia@hp.com 8 © Copyright 2011 Hewlett-Packard Development Company, L.P.