IT Security Trends 2013

22
IT Security Trends 2013 Assoc. Prof. Dr. Thanachart Numnonda Executive Director IMC Institute 21 January 2013 ISO & SECURITY MASHUP Seminar: Organized by Asian Intelligent Information Technology Co., Ltd. & E-Cqurity (Thailand) Co., Ltd.

description

Presentation for ISO & SECURITY MASHUP Seminar: Organized by Asian Intelligent Information Technology Co., Ltd. & E-Cqurity (Thailand) Co., Ltd

Transcript of IT Security Trends 2013

Page 1: IT Security Trends 2013

IT SecurityTrends 2013

Assoc. Prof. Dr. Thanachart NumnondaExecutive DirectorIMC Institute21 January 2013

ISO & SECURITY MASHUP Seminar: Organized byAsian Intelligent Information Technology Co., Ltd. & E-Cqurity (Thailand) Co., Ltd.

Page 2: IT Security Trends 2013

2

Gartner Top 10 Strategic Technology Trends

Media tablets and beyond

Mobile-centric applications and interfaces

Social &contextual user experience

Application stores and marketplace

The Internet of everything

Next-generation analytics

Big data

In-memory computing

Extreme low-energy servers

Cloud computing

Mobile Device Battles

Mobile Applications and HTML5

Personal Cloud

Enterprise App Stores

The Internet of Things

Hybrid IT and Cloud Computing

Strategic Big Data

Actionable Analytics

In Memory Computing

Integrated Ecosystems

2012 2013

Page 3: IT Security Trends 2013

3

Mobile ComputingCloud Computing

Social Technologies Information

Page 4: IT Security Trends 2013

4

Bring Your Own Devices (BYOD)

Page 5: IT Security Trends 2013

5

Public Personal Cloud

Page 6: IT Security Trends 2013

6

“Social computing is moving from being just on the outside of the organization to being at the core of business operations.”

Peter Sondergaard, senior vice president at Gartner, 2012

Page 7: IT Security Trends 2013

7

“Big data currently has the most significant impact in social network analysis and content analytics

with 45% of new spending each year.”

Gartner, 2012

Page 8: IT Security Trends 2013

8

Sign of the Times

1995: Employee Car

2005: Employee Cell Phone

2015: Employee Computer / Devices

Page 9: IT Security Trends 2013

9

Mobile in Enterprise

Gartner forecasts that in 2016, half of all non-PC devices will be purchased by employees. By the end of the decade, half of all devices in business will be purchased by employees.

By 2016, 60% of large enterprises will implement limited access network zones to limit the connectivity of personally owned mobile devices.

Gartner predicts that through 2017, 90% of enterprises will have two or more mobile operating systems to support.

Page 10: IT Security Trends 2013

10

Security Trends

Security investments are going to dramatically increase. An already large security market is about to get much bigger, growing by 56% from current levels in five years time, while cloud security will almost triple.

More than 50% of firms currently providing identity access management as a service (IAMaaS) and cloud-based IAM solutions will be acquired by larger service providers by year-end 2015.

Source :http://www.networkworld.com/

Page 11: IT Security Trends 2013

11

Security Trends

Through 2013, 80% of cloud security incidents will be due to administrative error by cloud service providers or user management of cloud services.

For low-security environments, or for workloads that have simple security requirements, relying on the security built into structure or into the public cloud service will be good enough

At the high end, security will be kept separate from private or public cloud infrastructure -- just as we did when internal networks were virtualized

Source :http://www.networkworld.com/

Page 12: IT Security Trends 2013

12

Security Trends

The vast middle will compromise and run security workloads in the private cloud and public cloud environments.

There is an urgent need for companies to separate personal and business operations on consumer smartphones and tablets (both company- and user-owned)

Source http://www.networkworld.com/

Page 13: IT Security Trends 2013

13

Seven Top Security Trends

For 2013

Page 14: IT Security Trends 2013

14

Mainstream Cloud and Mobile Adoption Seeks Security

Source http://www.informationweek.com/

Page 15: IT Security Trends 2013

15

Businesses Begin Sandboxing Smartphone Apps

Source http://www.informationweek.com/

Page 16: IT Security Trends 2013

16

Cloud Offers Unprecedented Attack Strength

Source http://www.informationweek.com/

Page 17: IT Security Trends 2013

17

Post-Flashback, Cross-Platform Attacks Increase

Source http://www.informationweek.com/

Page 18: IT Security Trends 2013

18

Destructive Malware Targets Critical Infrastructure

Source http://www.informationweek.com/

Page 19: IT Security Trends 2013

19

Hackers Target QR Codes, TecTiles

Source http://www.informationweek.com/

Page 20: IT Security Trends 2013

20

Digital Wallets Become Cybercrime Targets

Source http://www.informationweek.com/

Page 21: IT Security Trends 2013

21

Summary

Mega IT Trends : Cloud Computing, Mobile Technology, Social Technology and Information.

Enterprise IT Impact: BYOD, Personal Cloud, Social Enterprise.

7 Top IT Security Trends: Mostly based on CSMI:

– Cloud Security, Mobile Security, Cross Platform, Mobile Wallet, QR Code, Critical Infrastructure

Page 22: IT Security Trends 2013

22

Thank you

[email protected]/imcinstitutewww.slideshare.net/imcinstitute