SlideShare a Scribd company logo
2015 Security Trends
(So far…)
Edward Vasko, CISSP
CEO
About Terra Verde
Terra Verde provides customized risk
management services and solutions to your
business.
Our mission is to provide value driven, high quality
cybersecurity services and solutions our clients will
recommend to their associates, partners and peers.
1
Trend Trend Trend Trend
Trends
2015 Top Security Trends
Information Security is undergoing huge growth and changes.
The general public is now more than ever painfully aware of IT
Security. Technology is changing at an accelerated rate, threats
are evolving almost at the same pace.
• Data from our Scottsdale Security Operations Center (SOC)
• Virtualization
• Monitoring, Defense, Testing, Intelligence
• Network, Cloud, Mobility
• Identity and Access Mgmt.
• PCI DSS Compliance
2
Data from our SOC (1/2)
At Terra Verde we operate a Security Operations Center
monitoring security related events for thousands of systems
nationwide. From January 2015 until yesterday these are the top
events flooding our Security Information and Event Management
systems:
• Outdated clients (including frameworks): flash, java, PHP.
• Automated attacks are targeting these outdated systems.
• Vulnerable clients susceptible to Heartbleed and POODLE are
being attacked.
• CHS systems was hacked due to this weakness
(https://www.trustedsec.com/august-2014/chs-hacked-heartbleed-
exclusive-trustedsec/)
3
Data from our SOC (1/2)
• XSS "cross-site scripting“ attacks are on the rise.
• Combined phishing attacks with Stored XSS are making a comeback.
• Shellshock exploits are being attempted at an increased rate.
• BrowserStack was hacked vie ShellShock
(http://www.esecurityplanet.com/network-security/browserstack-
hacked-via-shellshock.html)
4
Data from our SOC (2/2)
• Attempted SQL injections are evolving.
• Reconnaissance scanning from high threat countries such
as China and Russia have increased in 2015 Q1.
• The use of exploit kits including angler, fiesta, magnitude
and nuclear are gaining popularity.
5
Virtualization (1/2)
• Security is being Virtualized
• Most solutions we grew accustomed to in data centers are
now readily available and deployable in the cloud. Anything
from routers and switched to specialized appliances.
• Security controls are now residing in the cloud.
• More and more organizations are migrating from data
centers to the cloud. With those migrations technical
security controls are now in the cloud as well. The
challenge is brokering the co-existence of these solutions.
6
Virtualization (2/2)
• Unified Threat Management
• SIEMs and other sophisticated monitoring solutions are evolving to
correlate live data to system’s events, potential threats, likelihood
and providing actionable data.
• Hybrid Environments
• Virtualization efforts are leaving behind hybrid environments. Full
migration is not possible every time. Deploying security controls
and administering in both the physical data center and the cloud
are posing a new set of challenges for organizations.
7
Monitoring, Defense, Testing, Intelligence (1/2)
• Threat detection and response
• Monitoring, Protection and Response are no longer
enough. The model is evolving to the realms of
avoidance. The new model is becoming: Detect,
Respond, Predict and Prevent.
• Big data security analytics
• Defenses against targeted attacks are now driven by
risk and justified by data analytics and
aggregation.
8
Monitoring, Defense, Testing, Intelligence (2/2)
• Security intelligence
• Security intelligence is improving significantly. It no
longer serves one audience (IT) it is now serving the
business too.
• Context-aware controls
• Next generation data loss prevention tools can be
adjusted to deal with multiple contexts: endpoint,
network, user, entity, channels, products and
analytics.
9
Network, Cloud, Mobility (1/3)
• UTM – Unified Threat Management is not quite integrated at
all levels and all devices. There are still some limitations in
terms of support and compatibility with all nodes that
generate security related events.
• Cloud Access Security brokerage services
• Contextual information from physical and virtual assets are leading to
policy decisions around:
• Operations: load balancing, access control, content delivery network
optimization, etc.
• Security: identity management, logging, monitoring, data loss prevention,
malware analysis, etc.
10
Network, Cloud, Mobility (2/3)
• Website protection
• Web application firewalls are being put to the test and they are
delivering exceptional services (not after some pain, you get what
you pay for and more importantly what you configured for)
• "Brobot" and "Kamikaze/Toxin“ botnets keep being used to launch
DDOS attacks toward financial institutions. Compromised high
bandwidth webservers with vulnerable content management
systems (CMS) are being used to upload attack scripts to the high
bandwidth servers.
11
Network, Cloud, Mobility (3/3)
• Endpoint breach shifting to mobile devices
• Increased number of threats are targeting mobile platforms.
• Researchers have demonstrated success rate of over 90%
(http://www.fiercewireless.com/tech/story/researchers-demo-92-
success-rate-hacking-smartphone-apps/2014-08-24)
• Smartphone-based POS applications attacks are on the rise.
• Mobile POS and app-based wallets are being targeted
• Most attacks on mobile devices still require human collaboration:
• Trojan, Trojan downloaders, Trojan-SMS, Trojan-spy,
backdoors, adware, etc.
12
PCI DSS Compliance
Payment Card Industry (PCI DSS)
• Version 3.0 introduced multiple challenges:
• Legal agreements 12.8.2
• Secure protocols (SSL)
• Card Data environments scope are increasingly challenged with
cloud solutions.
• Tokenization offers and solutions are not articulating vendor’s
responsibilities.
• EMV implementation deadlines are fast approaching.
• Requirement 9.9: Physical access and point of sale
13
THANK YOU!
Questions?
Edward.Vasko@tvrms.com
Office: 480-840-1744
info@TVRMS.com
http://www.TVRMS.com
About Terra Verde
About
• Established in 2008
• Headquartered in Scottsdale
• Payment Card Industry Qualified
Security Assessor – PCI QSA
• Pragmatic solutions to solve
problems
15
Key differentiators
• Objective and certified
• Experienced & dedicated
• Service team averages 18 years
experience
Primary markets served
• Health Care
• Financial Institutions
• Gaming/Hospitality
• Retail
• Technology
Background
• 40 FTEs
• Hundreds of engagements performed
worldwide
• Largest AZ headquartered security
company
Terra Verde Services
Assessment/Testing
• Penetration testing
• Vulnerability assessment
• Technical risk assessment
• Web security assessment
• Physical security assessment
Security Strategy
• Maturity assessment
• Interim leadership
• Program
support/implementation
• Control implementation
• Secure SDLC
Technology Operational Risk
• Advisory services
• Expert Witness
• Forensics/Incident Response
• Project Management
16
Compliance & Audit
PCI, HIPAA, SOX, FTC, FISMA, CSP,
ISO, etc.
Terra Verde Solutions
Managed Security
• Device monitoring
• Security device
management
• Web application firewall
• Vulnerability Management
• Compliance portal
• Patching
• 24x7 US based SOC
Audit Documentation
• Eliminate audit fire drills
• “Business as Usual”
• Reduce compliance costs
Application Monitoring
• Metrics
• Performance/availability
• Secure SDLC
17

More Related Content

PPSX
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
James Mulhern
 
PDF
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
DevOps Indonesia
 
PPTX
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
North Texas Chapter of the ISSA
 
PPTX
The_CNPITH_STORY_V1.2(draft)
David Simpson
 
PPTX
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
PPTX
Marc Crudgington Who I Am
Marc Crudgington, MBA
 
PDF
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
PPTX
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
North Texas Chapter of the ISSA
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
James Mulhern
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
DevOps Indonesia
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
North Texas Chapter of the ISSA
 
The_CNPITH_STORY_V1.2(draft)
David Simpson
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Marc Crudgington Who I Am
Marc Crudgington, MBA
 
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
North Texas Chapter of the ISSA
 

What's hot (20)

PDF
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
 
PDF
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ivanti
 
PPTX
What is cyber resilience?
Aaron Clark-Ginsberg
 
PDF
Introduction to Cyber Resilience
Peter Wood
 
PDF
McAfee Total Protection for Data Loss Prevention (DLP)
Trustmarque
 
PPTX
Webinar Ivanti Neurons For Patch Intelligence
Ivanti
 
PPTX
Risk Management Approach to Cyber Security
Ernest Staats
 
PDF
M&A security - E-crime Congress 2017
EQS Group
 
PDF
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
EQS Group
 
PDF
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
Dell EMC World
 
PPTX
Your cyber security webinar
Empired
 
PDF
Hunting for cyber threats targeting weapon systems
Fidelis Cybersecurity
 
PDF
Symantec Cyber Security Services: Security Simulation
Symantec
 
PPTX
Dressing up the ICS Kill Chain
Dragos, Inc.
 
PDF
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
Dell EMC World
 
PPTX
2018 Year in Review- ICS Threat Activity Groups
Dragos, Inc.
 
PPTX
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
PDF
Core_Network_Insight
Tim Bell
 
PDF
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ivanti
 
What is cyber resilience?
Aaron Clark-Ginsberg
 
Introduction to Cyber Resilience
Peter Wood
 
McAfee Total Protection for Data Loss Prevention (DLP)
Trustmarque
 
Webinar Ivanti Neurons For Patch Intelligence
Ivanti
 
Risk Management Approach to Cyber Security
Ernest Staats
 
M&A security - E-crime Congress 2017
EQS Group
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
EQS Group
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
Dell EMC World
 
Your cyber security webinar
Empired
 
Hunting for cyber threats targeting weapon systems
Fidelis Cybersecurity
 
Symantec Cyber Security Services: Security Simulation
Symantec
 
Dressing up the ICS Kill Chain
Dragos, Inc.
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
Dell EMC World
 
2018 Year in Review- ICS Threat Activity Groups
Dragos, Inc.
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
Core_Network_Insight
Tim Bell
 
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Ad

Viewers also liked (20)

PPTX
Trends in Information Security
CompTIA
 
PDF
Information Security Benchmarking 2015
Capgemini
 
PDF
Gartner: Top 10 Technology Trends 2015
Den Reymer
 
PDF
Trends In The Israeli Information Security Market 2008
Shahar Geiger Maor
 
PPTX
CompTIA 11th Annual Information Security Trends
CompTIA
 
PPT
Major global information security trends - a summary
SensePost
 
PPTX
Les xarxes socials
XSAlejandroP
 
PPTX
Weather forecast powerpoint
alaynasandefur
 
PPT
Super tech
InternationalDoor
 
PDF
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
orthomedico
 
PDF
TRYmovie京都スタジオのご案内
yamato-c
 
PPTX
Topic mother’s day
tappasarn
 
PPTX
PCI 3.0 – What You Need to Know
Terra Verde
 
PPT
New employees primer
InternationalDoor
 
PDF
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
orthomedico
 
DOCX
Irakasle eta ikasleentzako gaitasun mapak
Javi Echarri
 
PPTX
FXLab_platform_ru
Lyubich
 
PDF
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
orthomedico
 
PPT
Designing a showroom
InternationalDoor
 
PPTX
Gustar project
TrevorHoffa3322
 
Trends in Information Security
CompTIA
 
Information Security Benchmarking 2015
Capgemini
 
Gartner: Top 10 Technology Trends 2015
Den Reymer
 
Trends In The Israeli Information Security Market 2008
Shahar Geiger Maor
 
CompTIA 11th Annual Information Security Trends
CompTIA
 
Major global information security trends - a summary
SensePost
 
Les xarxes socials
XSAlejandroP
 
Weather forecast powerpoint
alaynasandefur
 
Super tech
InternationalDoor
 
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
orthomedico
 
TRYmovie京都スタジオのご案内
yamato-c
 
Topic mother’s day
tappasarn
 
PCI 3.0 – What You Need to Know
Terra Verde
 
New employees primer
InternationalDoor
 
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
orthomedico
 
Irakasle eta ikasleentzako gaitasun mapak
Javi Echarri
 
FXLab_platform_ru
Lyubich
 
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
orthomedico
 
Designing a showroom
InternationalDoor
 
Gustar project
TrevorHoffa3322
 
Ad

Similar to 2015 Year to Date Security Trends (20)

PPTX
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
PPTX
CSO CXO Series Breakfast
CSO_Presentations
 
PPTX
SAM05_Barber PW (7-9-15)
Norm Barber
 
PDF
Insights into cyber security and risk
EY
 
PDF
The Role Of Data Analytics In Cybersecurity
ABMCollege2
 
PDF
Data Center Security Market — Explore latest facts on networking 2025
Arushi00
 
PDF
Next-Generation SIEM: Delivered from the Cloud
Alert Logic
 
PPTX
Managed Security Operations Centre Alternative - Managed Security Service
Netpluz Asia Pte Ltd
 
PDF
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
PDF
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
PDF
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
PDF
Cyber security general perspective a
marukanda
 
PDF
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
PPTX
Build a Cyber Resilient Network with Symantec
Arrow ECS UK
 
PPTX
Cyber security within Organisations: A sneaky peak of current status, trends,...
Marco Casassa Mont
 
PDF
Secure Your Data Center with a Comprehensive Security Framework in 2025.pdf
manoharparakh
 
PDF
Secure Your Data Center with a Comprehensive Security Framework in 2025.pdf
manoharparakh
 
PDF
Advanced Approaches to Data Center Security.pdf
manoharparakh
 
PDF
Advanced Approaches to Data Center Security.pdf
manoharparakh
 
PPTX
Cyber Security in the market place: HP CTO Day
Symantec
 
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
CSO CXO Series Breakfast
CSO_Presentations
 
SAM05_Barber PW (7-9-15)
Norm Barber
 
Insights into cyber security and risk
EY
 
The Role Of Data Analytics In Cybersecurity
ABMCollege2
 
Data Center Security Market — Explore latest facts on networking 2025
Arushi00
 
Next-Generation SIEM: Delivered from the Cloud
Alert Logic
 
Managed Security Operations Centre Alternative - Managed Security Service
Netpluz Asia Pte Ltd
 
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
Cyber security general perspective a
marukanda
 
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
Build a Cyber Resilient Network with Symantec
Arrow ECS UK
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Marco Casassa Mont
 
Secure Your Data Center with a Comprehensive Security Framework in 2025.pdf
manoharparakh
 
Secure Your Data Center with a Comprehensive Security Framework in 2025.pdf
manoharparakh
 
Advanced Approaches to Data Center Security.pdf
manoharparakh
 
Advanced Approaches to Data Center Security.pdf
manoharparakh
 
Cyber Security in the market place: HP CTO Day
Symantec
 

Recently uploaded (20)

PPTX
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
This slide provides an overview Technology
mineshkharadi333
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Software Development Methodologies in 2025
KodekX
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Doc9.....................................
SofiaCollazos
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 

2015 Year to Date Security Trends

  • 1. 2015 Security Trends (So far…) Edward Vasko, CISSP CEO
  • 2. About Terra Verde Terra Verde provides customized risk management services and solutions to your business. Our mission is to provide value driven, high quality cybersecurity services and solutions our clients will recommend to their associates, partners and peers. 1
  • 3. Trend Trend Trend Trend Trends 2015 Top Security Trends Information Security is undergoing huge growth and changes. The general public is now more than ever painfully aware of IT Security. Technology is changing at an accelerated rate, threats are evolving almost at the same pace. • Data from our Scottsdale Security Operations Center (SOC) • Virtualization • Monitoring, Defense, Testing, Intelligence • Network, Cloud, Mobility • Identity and Access Mgmt. • PCI DSS Compliance 2
  • 4. Data from our SOC (1/2) At Terra Verde we operate a Security Operations Center monitoring security related events for thousands of systems nationwide. From January 2015 until yesterday these are the top events flooding our Security Information and Event Management systems: • Outdated clients (including frameworks): flash, java, PHP. • Automated attacks are targeting these outdated systems. • Vulnerable clients susceptible to Heartbleed and POODLE are being attacked. • CHS systems was hacked due to this weakness (https://www.trustedsec.com/august-2014/chs-hacked-heartbleed- exclusive-trustedsec/) 3
  • 5. Data from our SOC (1/2) • XSS "cross-site scripting“ attacks are on the rise. • Combined phishing attacks with Stored XSS are making a comeback. • Shellshock exploits are being attempted at an increased rate. • BrowserStack was hacked vie ShellShock (http://www.esecurityplanet.com/network-security/browserstack- hacked-via-shellshock.html) 4
  • 6. Data from our SOC (2/2) • Attempted SQL injections are evolving. • Reconnaissance scanning from high threat countries such as China and Russia have increased in 2015 Q1. • The use of exploit kits including angler, fiesta, magnitude and nuclear are gaining popularity. 5
  • 7. Virtualization (1/2) • Security is being Virtualized • Most solutions we grew accustomed to in data centers are now readily available and deployable in the cloud. Anything from routers and switched to specialized appliances. • Security controls are now residing in the cloud. • More and more organizations are migrating from data centers to the cloud. With those migrations technical security controls are now in the cloud as well. The challenge is brokering the co-existence of these solutions. 6
  • 8. Virtualization (2/2) • Unified Threat Management • SIEMs and other sophisticated monitoring solutions are evolving to correlate live data to system’s events, potential threats, likelihood and providing actionable data. • Hybrid Environments • Virtualization efforts are leaving behind hybrid environments. Full migration is not possible every time. Deploying security controls and administering in both the physical data center and the cloud are posing a new set of challenges for organizations. 7
  • 9. Monitoring, Defense, Testing, Intelligence (1/2) • Threat detection and response • Monitoring, Protection and Response are no longer enough. The model is evolving to the realms of avoidance. The new model is becoming: Detect, Respond, Predict and Prevent. • Big data security analytics • Defenses against targeted attacks are now driven by risk and justified by data analytics and aggregation. 8
  • 10. Monitoring, Defense, Testing, Intelligence (2/2) • Security intelligence • Security intelligence is improving significantly. It no longer serves one audience (IT) it is now serving the business too. • Context-aware controls • Next generation data loss prevention tools can be adjusted to deal with multiple contexts: endpoint, network, user, entity, channels, products and analytics. 9
  • 11. Network, Cloud, Mobility (1/3) • UTM – Unified Threat Management is not quite integrated at all levels and all devices. There are still some limitations in terms of support and compatibility with all nodes that generate security related events. • Cloud Access Security brokerage services • Contextual information from physical and virtual assets are leading to policy decisions around: • Operations: load balancing, access control, content delivery network optimization, etc. • Security: identity management, logging, monitoring, data loss prevention, malware analysis, etc. 10
  • 12. Network, Cloud, Mobility (2/3) • Website protection • Web application firewalls are being put to the test and they are delivering exceptional services (not after some pain, you get what you pay for and more importantly what you configured for) • "Brobot" and "Kamikaze/Toxin“ botnets keep being used to launch DDOS attacks toward financial institutions. Compromised high bandwidth webservers with vulnerable content management systems (CMS) are being used to upload attack scripts to the high bandwidth servers. 11
  • 13. Network, Cloud, Mobility (3/3) • Endpoint breach shifting to mobile devices • Increased number of threats are targeting mobile platforms. • Researchers have demonstrated success rate of over 90% (http://www.fiercewireless.com/tech/story/researchers-demo-92- success-rate-hacking-smartphone-apps/2014-08-24) • Smartphone-based POS applications attacks are on the rise. • Mobile POS and app-based wallets are being targeted • Most attacks on mobile devices still require human collaboration: • Trojan, Trojan downloaders, Trojan-SMS, Trojan-spy, backdoors, adware, etc. 12
  • 14. PCI DSS Compliance Payment Card Industry (PCI DSS) • Version 3.0 introduced multiple challenges: • Legal agreements 12.8.2 • Secure protocols (SSL) • Card Data environments scope are increasingly challenged with cloud solutions. • Tokenization offers and solutions are not articulating vendor’s responsibilities. • EMV implementation deadlines are fast approaching. • Requirement 9.9: Physical access and point of sale 13
  • 16. About Terra Verde About • Established in 2008 • Headquartered in Scottsdale • Payment Card Industry Qualified Security Assessor – PCI QSA • Pragmatic solutions to solve problems 15 Key differentiators • Objective and certified • Experienced & dedicated • Service team averages 18 years experience Primary markets served • Health Care • Financial Institutions • Gaming/Hospitality • Retail • Technology Background • 40 FTEs • Hundreds of engagements performed worldwide • Largest AZ headquartered security company
  • 17. Terra Verde Services Assessment/Testing • Penetration testing • Vulnerability assessment • Technical risk assessment • Web security assessment • Physical security assessment Security Strategy • Maturity assessment • Interim leadership • Program support/implementation • Control implementation • Secure SDLC Technology Operational Risk • Advisory services • Expert Witness • Forensics/Incident Response • Project Management 16 Compliance & Audit PCI, HIPAA, SOX, FTC, FISMA, CSP, ISO, etc.
  • 18. Terra Verde Solutions Managed Security • Device monitoring • Security device management • Web application firewall • Vulnerability Management • Compliance portal • Patching • 24x7 US based SOC Audit Documentation • Eliminate audit fire drills • “Business as Usual” • Reduce compliance costs Application Monitoring • Metrics • Performance/availability • Secure SDLC 17