1
Stop the BREACH!
Farook Al-Jibouri
March 2018
IT LIVE 2018, Baghdad – Iraq
2
3
The story of “wheelsnation.net”
The Shifting of IT
Environment
(… or why
security has
become so
important)
5
• Many applications/transactions now operate over
the web
• Cloud is changing our notion of a perimeter
• Worker mobility is redefining the IT landscape
• Shadow IT is becoming enterprise IT
• Majority of web transactions are now encrypted
(SSL)
• The security model has changed from good
people vs. bad people to enabling zero-trust
6
CIO spending priority for 2018
SECURITY #1
7
Expect increase spending in 2018
88% of CIOS
8
YET 66% OF COMPANIES
ARE STILL BREACHED
66%$86BSPENT ON SECURITY
IN 2017
And worse, they’re breached
on average five or more times
TODAY’S SECURITY IS NOT SECURE
9
62% CEOs INCORRECTLY
CITE MALWARE
As the primary threat to cybersecurity vs identity.
That’s wrong. Phishing, privilege and compromised
passwords are more prevalent — something TOs recognize.
CEOs were more likely (62% vs 35%) than Technical Officers to believe malware is the primary threat to cybersecurity
10
SENSATIONAL MALWARE HEADLINES IN 2017
11
SENSATIONAL MALWARE HEADLINES IN 2017
WANNACRY
Britain’s National Health System
one of the biggest victimsNHS
Systems infected overnight
in 150 countries200k+
PETYA
Companies using same accounting
software fall victim to ransomware100s
NOTPETYA
Claims to be ransomware but
simply spreads and encrypts.
Targets privileged access and credentials.
BADRABBIT
Another major ransomware outbreak
Variant of Petya
12
IS IRAQ FAR AWAY FROM BREACH?
WANNACRY
Britain’s National Health System
one of the biggest victimsNHS
Systems infected overnight
in 150 countries200k+
PETYA
Companies using same accounting
software fall victim to ransomware100s
NOTPETYA
Claims to be ransomware but
simply spreads and encrypts.
Targets privileged access and credentials.
BADRABBIT
Another major ransomware outbreak
Variant of Petya
13
Arabic States
Iraq ranked 19 / 22
14
Globally
Iraq ranked 159 / 193
15
CEOs are MISALIGNED
With cybersecurity priorities
16
60% of CEOs are
MISINVESTING
Investing the most in malware prevention even though
92% TOs claim “well-prepared” for malware
CEOs intend to invest the most in malware prevention (60%) vs privileged access abuse (28%) or stolen passwords (32%)
17
CEOs are MISINFORMED
CEO Disconnect On Cybersecurity Increases Risk Of Breaches
This despite recent massive innovation, including machine learning, that has dramatically reduced the burden of deploying and managing MFA
CEOs biggest concern with security is poor user experience
This same innovation has dramatically reduce the learning curve and burden for users, become smarter about when to prompt and uses ubiquitous smartphones
18
40% more TECH OFFICERS
Frustrated by inadequate security budgets than CEOs
(31% Technical Officers vs 22% CEOs)
19
2018 Predictions
Ransomware
Breaches Get Worse
GDPR
Biometric Adoption
AI & Machine Learning
More Mobile Threats
20
THIS NEW THREATSCAPE REQUIRES
ZERO TRUST SECURITY
21
Regulations & Compliance
We have to do it … NOW!
22
Making the BUSINESS CASE
for SECURITY
23
AVOID SERVICE INTERRUPTION!
E.g. Internet shutdown on Exams
BUSINESS CONTINUITY
e.g. Gov Websites and critical services
GET DEEPER
having deep visibility with help you detect breaches earlier.
STAY IN CONTROL!
AVOID the CRISIS
24
HOW WE CAN HAD
ZERO TRUST SECURITY?
Think Strategy … not Product
25
50%fewer breaches
FORRESTER FINDS IMPLEMENTING
BEST PRACTICES RESULTS IN
in cost savings$5 MIL
less on technology costs40%
26
In the absence of security education or experience,
people (employees, users, customers, …) naturally
make poor security decisions with technology
Stay Up-to-Date!
27
Iraq Progress towards Cyber Security
Iraqi Cyber Events
Response Team
Central Bank of Iraq ISACA Iraq
28
What Iraq Security Needs?
* Infrastructure Security: e.g. IGW
basic To have robust security for the country infrastructure
* Iraq National Cyber Security Center
drive Security researches and analysis of threat landscape
* Professional Learning Centers for Security
for Capacity building
* Regulations & Policy
29
Enjoy the rest of
IT LIVE 2018 

More Related Content

PPTX
Cyber Security Threats in the Financial Sector
PPTX
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
ODP
Cyber Security for Financial Institutions
PDF
Cybersecurity in Banking Sector
PPTX
Information Security Management System in the Banking Sector
PDF
The July 2017 Cybersecurity Risk Landscape
PDF
The Seven Kinds of Security
PDF
Healthcare Cybersecurity Survey 2018 - Sirius
Cyber Security Threats in the Financial Sector
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cyber Security for Financial Institutions
Cybersecurity in Banking Sector
Information Security Management System in the Banking Sector
The July 2017 Cybersecurity Risk Landscape
The Seven Kinds of Security
Healthcare Cybersecurity Survey 2018 - Sirius

What's hot (20)

PDF
100+ Cyber Security Interview Questions and Answers in 2022
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PDF
Passwordless is Possible - How to Remove Passwords and Improve Security
PPTX
2017 Predictions: Identity and Security
PPTX
Websecurity fundamentals for beginners
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPTX
The State Of Information and Cyber Security in 2016
PPTX
NDIA 2021 - solar winds overview and takeaways
PDF
2019 State of Cyber Security Report
PPTX
Valuing Data in the Age of Ransomware
PPTX
Rise of Ransomware
DOCX
What you need to know about cyber security
PDF
Why Startups Need to Strengthen Application Security
PDF
Cyber Security 4.0 conference 30 November 2016
PDF
Strategies to combat new, innovative cyber threats in 2019
PPTX
2017 Security Report Presentation
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Top 7 Security Measures for IoT Systems
PPTX
5 Cybersecurity threats in Public Sector
PPTX
Compete To Win: Don’t Just Be Compliant – Be Secure!
100+ Cyber Security Interview Questions and Answers in 2022
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Passwordless is Possible - How to Remove Passwords and Improve Security
2017 Predictions: Identity and Security
Websecurity fundamentals for beginners
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
The State Of Information and Cyber Security in 2016
NDIA 2021 - solar winds overview and takeaways
2019 State of Cyber Security Report
Valuing Data in the Age of Ransomware
Rise of Ransomware
What you need to know about cyber security
Why Startups Need to Strengthen Application Security
Cyber Security 4.0 conference 30 November 2016
Strategies to combat new, innovative cyber threats in 2019
2017 Security Report Presentation
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Top 7 Security Measures for IoT Systems
5 Cybersecurity threats in Public Sector
Compete To Win: Don’t Just Be Compliant – Be Secure!
Ad

Similar to IT Live 2018 - Farook Al-Jibouri: Stop The Breach (20)

PDF
2014 the future evolution of cybersecurity
PDF
The 10 Secret Codes of Security
PDF
"Evolving cybersecurity strategies" - Seizing the Opportunity
PPTX
Top 12 Threats to Enterprise
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PDF
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
PDF
2017 in Review: Infosec Pros Look Back on the Year
PDF
Cyber Security in Manufacturing
PDF
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
PDF
Cyber risk reporting aicpa framework
PPTX
I Costi del Cybercrime 2017 - Italia
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
PDF
Fall2015SecurityShow
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
Pivotal Role of HR in Cybersecurity
PDF
Security Industry Overview
PPTX
CompTIA International Trends in Cybersecurity
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PPTX
2024 Security Outlook & Essential Security Practices
PPTX
Vodqa why cybersecurity
2014 the future evolution of cybersecurity
The 10 Secret Codes of Security
"Evolving cybersecurity strategies" - Seizing the Opportunity
Top 12 Threats to Enterprise
Art Hathaway - Artificial Intelligence - Real Threat Prevention
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2017 in Review: Infosec Pros Look Back on the Year
Cyber Security in Manufacturing
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
Cyber risk reporting aicpa framework
I Costi del Cybercrime 2017 - Italia
The 10 Fastest Growing Cyber Security Companies of 2017
Fall2015SecurityShow
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Pivotal Role of HR in Cybersecurity
Security Industry Overview
CompTIA International Trends in Cybersecurity
Wfh security risks - Ed Adams, President, Security Innovation
2024 Security Outlook & Essential Security Practices
Vodqa why cybersecurity
Ad

Recently uploaded (20)

PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Human Computer Interaction Miterm Lesson
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Internet of Everything -Basic concepts details
PDF
substrate PowerPoint Presentation basic one
PDF
The AI Revolution in Customer Service - 2025
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Examining Bias in AI Generated News Content.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Build Real-Time ML Apps with Python, Feast & NoSQL
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Human Computer Interaction Miterm Lesson
Co-training pseudo-labeling for text classification with support vector machi...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Electrocardiogram sequences data analytics and classification using unsupervi...
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Advancing precision in air quality forecasting through machine learning integ...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
Internet of Everything -Basic concepts details
substrate PowerPoint Presentation basic one
The AI Revolution in Customer Service - 2025
CEH Module 2 Footprinting CEH V13, concepts
Examining Bias in AI Generated News Content.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...

IT Live 2018 - Farook Al-Jibouri: Stop The Breach

  • 1. 1 Stop the BREACH! Farook Al-Jibouri March 2018 IT LIVE 2018, Baghdad – Iraq
  • 2. 2
  • 3. 3 The story of “wheelsnation.net”
  • 4. The Shifting of IT Environment (… or why security has become so important)
  • 5. 5 • Many applications/transactions now operate over the web • Cloud is changing our notion of a perimeter • Worker mobility is redefining the IT landscape • Shadow IT is becoming enterprise IT • Majority of web transactions are now encrypted (SSL) • The security model has changed from good people vs. bad people to enabling zero-trust
  • 6. 6 CIO spending priority for 2018 SECURITY #1
  • 7. 7 Expect increase spending in 2018 88% of CIOS
  • 8. 8 YET 66% OF COMPANIES ARE STILL BREACHED 66%$86BSPENT ON SECURITY IN 2017 And worse, they’re breached on average five or more times TODAY’S SECURITY IS NOT SECURE
  • 9. 9 62% CEOs INCORRECTLY CITE MALWARE As the primary threat to cybersecurity vs identity. That’s wrong. Phishing, privilege and compromised passwords are more prevalent — something TOs recognize. CEOs were more likely (62% vs 35%) than Technical Officers to believe malware is the primary threat to cybersecurity
  • 11. 11 SENSATIONAL MALWARE HEADLINES IN 2017 WANNACRY Britain’s National Health System one of the biggest victimsNHS Systems infected overnight in 150 countries200k+ PETYA Companies using same accounting software fall victim to ransomware100s NOTPETYA Claims to be ransomware but simply spreads and encrypts. Targets privileged access and credentials. BADRABBIT Another major ransomware outbreak Variant of Petya
  • 12. 12 IS IRAQ FAR AWAY FROM BREACH? WANNACRY Britain’s National Health System one of the biggest victimsNHS Systems infected overnight in 150 countries200k+ PETYA Companies using same accounting software fall victim to ransomware100s NOTPETYA Claims to be ransomware but simply spreads and encrypts. Targets privileged access and credentials. BADRABBIT Another major ransomware outbreak Variant of Petya
  • 15. 15 CEOs are MISALIGNED With cybersecurity priorities
  • 16. 16 60% of CEOs are MISINVESTING Investing the most in malware prevention even though 92% TOs claim “well-prepared” for malware CEOs intend to invest the most in malware prevention (60%) vs privileged access abuse (28%) or stolen passwords (32%)
  • 17. 17 CEOs are MISINFORMED CEO Disconnect On Cybersecurity Increases Risk Of Breaches This despite recent massive innovation, including machine learning, that has dramatically reduced the burden of deploying and managing MFA CEOs biggest concern with security is poor user experience This same innovation has dramatically reduce the learning curve and burden for users, become smarter about when to prompt and uses ubiquitous smartphones
  • 18. 18 40% more TECH OFFICERS Frustrated by inadequate security budgets than CEOs (31% Technical Officers vs 22% CEOs)
  • 19. 19 2018 Predictions Ransomware Breaches Get Worse GDPR Biometric Adoption AI & Machine Learning More Mobile Threats
  • 20. 20 THIS NEW THREATSCAPE REQUIRES ZERO TRUST SECURITY
  • 21. 21 Regulations & Compliance We have to do it … NOW!
  • 22. 22 Making the BUSINESS CASE for SECURITY
  • 23. 23 AVOID SERVICE INTERRUPTION! E.g. Internet shutdown on Exams BUSINESS CONTINUITY e.g. Gov Websites and critical services GET DEEPER having deep visibility with help you detect breaches earlier. STAY IN CONTROL! AVOID the CRISIS
  • 24. 24 HOW WE CAN HAD ZERO TRUST SECURITY? Think Strategy … not Product
  • 25. 25 50%fewer breaches FORRESTER FINDS IMPLEMENTING BEST PRACTICES RESULTS IN in cost savings$5 MIL less on technology costs40%
  • 26. 26 In the absence of security education or experience, people (employees, users, customers, …) naturally make poor security decisions with technology Stay Up-to-Date!
  • 27. 27 Iraq Progress towards Cyber Security Iraqi Cyber Events Response Team Central Bank of Iraq ISACA Iraq
  • 28. 28 What Iraq Security Needs? * Infrastructure Security: e.g. IGW basic To have robust security for the country infrastructure * Iraq National Cyber Security Center drive Security researches and analysis of threat landscape * Professional Learning Centers for Security for Capacity building * Regulations & Policy
  • 29. 29 Enjoy the rest of IT LIVE 2018 

Editor's Notes

  • #9: Let’s look at this another way: Last year we spent over $86B on cyber security yet a stunned 2/3rds of companies were still breached And worse, those that were breached averaged five or more separate breaches Bottom line: Something has to change. Today’s security is not secure.
  • #11: Why do we need a massive rethink of security? Simple: Shareholders are not safe Recent Ponemon study shows that stocks drop 5% after a breach is announced And worse, 30% of impacted consumers discontinue their relationship with the breached company A recent example of shareholder impact is Chipotle which saw it’s stock drop by $400M after announcing a breach Consumers are not safe Over one billion Yahoo users accounts were compromised for years before notifying users Note: this impacted the takeover offer from Verizon to the tune of $350M or 7% of the offer price Governments are not safe Poor authentication and misused privileged accounts resulted in 25M stolen personnel records Note: OPM breach involved the compromise of a “jump box” giving hackers control of every machine on the network Companies are not safe DNS provider (Dyn) knocked offline by a botnet of millions of IoT devices compromised because they all shared the same default password
  • #12: Why do we need a massive rethink of security? Simple: Shareholders are not safe Recent Ponemon study shows that stocks drop 5% after a breach is announced And worse, 30% of impacted consumers discontinue their relationship with the breached company A recent example of shareholder impact is Chipotle which saw it’s stock drop by $400M after announcing a breach Consumers are not safe Over one billion Yahoo users accounts were compromised for years before notifying users Note: this impacted the takeover offer from Verizon to the tune of $350M or 7% of the offer price Governments are not safe Poor authentication and misused privileged accounts resulted in 25M stolen personnel records Note: OPM breach involved the compromise of a “jump box” giving hackers control of every machine on the network Companies are not safe DNS provider (Dyn) knocked offline by a botnet of millions of IoT devices compromised because they all shared the same default password
  • #13: Why do we need a massive rethink of security? Simple: Shareholders are not safe Recent Ponemon study shows that stocks drop 5% after a breach is announced And worse, 30% of impacted consumers discontinue their relationship with the breached company A recent example of shareholder impact is Chipotle which saw it’s stock drop by $400M after announcing a breach Consumers are not safe Over one billion Yahoo users accounts were compromised for years before notifying users Note: this impacted the takeover offer from Verizon to the tune of $350M or 7% of the offer price Governments are not safe Poor authentication and misused privileged accounts resulted in 25M stolen personnel records Note: OPM breach involved the compromise of a “jump box” giving hackers control of every machine on the network Companies are not safe DNS provider (Dyn) knocked offline by a botnet of millions of IoT devices compromised because they all shared the same default password
  • #21: This new threatscape requires a complete paradigm shift. One that rethinks and challenges the network perimeter-based approach One that puts identity at the foundation of the massive security rethink. One that removes trust from the network and redefines security to follow identity based on knowing the user and their device before granting access A new paradigm that frees companies to move fearlessly into the modern cloudscape by not relying on implicit trust, but enforcing a dynamic security policy that only trusts when verified
  • #25: So how we can deliver Zero Trust Security?
  • #26: If you do these things, then what are the benefits of achieving Zero Trust maturity? According to a brand new study from Forrester, entitled “Stop the Breach”, there are massive benefits to improving Zero Trust maturity including: 50% reduction in the number of reported breaches An average of $5M in cost savings related to breaches Interestingly, the most mature organizations preferred an integrated platform approach vs point and custom one-off solutions. This strategic approach led to a 40% reduction in IAM technology costs as a percentage of IT budget. Massive savings.
  • #29: So what makes different or better than alternatives?