Professional Documents
Culture Documents
Social Media
Internet of Things
Mobility
Computing Ecosystems
4
1.2ZB
7.9ZB
61.8%
40ZB
UNSTRUCTURED DATA
GROWTH RATE TO 2014
http://thedatamap.org/
Threat Landscape
A fundamental shift
Old Motivation
Hacking
Cyber Crime
Cyber Espionage
Cyber Warfare
7
CYBERCRIME TO CYBERWAR
60%
77%
6X
243
10
INTERNET OF THINGS
RISK
RISK
RISK
23.56 KM
123
BPM
RISK
15.8
RISK
Whether you consider smartphones part of IoT or not, they are part of the
architecture of risks, with apps often being the user interface to IoT
12
NO PRIVACY
POLICY
52%
PII/LOGIN
CLEAR TEXT
20%*
How many other apps and websites is the same password used
on?
INTERNET SECURITY THREAT REPORT 2015, VOLUME 20
13
APP ANALYTICS
AD NETWORKS
14
APP PROVIDER
OS PROVIDER
SOCIAL MEDIA
APP FRAMEWORKS
AVG DOMAINS
CONTACTED
CRM/MARKETING
UTILITY API
14
1 in 4
68%
end users admit to not know what access they gave away
when agreeing to terms of the app
15
16
60%
77%
6X
243
17
Incident Response
Media Protection
Information Exchange
Agreements
Information Integrity
Auditing &
Accountability
Management
HIPAA Privacy
FERPA
Access Control
HIPAA Security
GLBA
PCI FISMA
ARRA/HITECH
Formal Audits
SOX
FACTA CJIS IRS 1075
HIPAA Omnibus Rule
Physical Security
Mobile Devices
Personnel Security
18
Use advanced threat intelligence solutions to help you find indicators of compromise and
respond faster to incidents.
Employ a strong
security posture
Provide ongoing
education and training
Establish guidelines and company policies and procedures for protecting sensitive data on
personal and corporate devices. Regularly assess internal investigation teamsand run practice
drillsto ensure you have the skills necessary to effectively combat cyber threats.
19
If it's Connected,
it's Vulnerable
Know the risks.
Stay Informed
symantec.com/threatreport
Twitter.com/threatintel
21
Thank You
Robert Myles, CISSP, CISM
National Practice Manager, State & Local Government
@RobertMyles
Robert_Myles@Symantec.com
http://www.linkedin.com/in/robertmyles/