22
1 © Copyright Fortinet Inc. All rights reserved. Cyber Threat Predictions for 2017 November 2016 Juan Manuel López Tecpoyotl SE Center Region

Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

1© Copyright Fortinet Inc. All rights reserved.

Cyber Threat Predictions for 2017November 2016

Juan Manuel López Tecpoyotl – SE Center Region

Page 2: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

2

▪Expanding digital economy

Higher digital footprint increases

the potential attack surface

▪Risks all around

Everything is a target and

anything can be a weapon

▪Intelligent, autonomous attacks

Threats are becoming intelligent,

can operate autonomously, and

are increasingly difficult to detect

▪Two attack types

Automated attacks against groups

of smaller targets and customized

attacks against larger targets

▪Blended attacks

Automated attacks being used as

a first phase, and targeted attacks

as a second phase

▪Return of old threats, but

enhanced

New technologies are making old

cyber threats more sophisticated

2016 Cyber Threat Observations

Page 3: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

3

Cyber Threat PredictionsTipping Point For Cybersecurity in 2017

Page 4: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

4

Cyber Threat Prediction #1

AUTOMATED AND HUMAN-LIKE ATTACKS WILL DEMAND MORE INTELLIGENT DEFENCE

▪ Threats getting smarter and

increasingly able to operate

autonomously

▪ AI or “human-like” malware designed

with adaptive, success-based

learning to improve the success and

efficacy of attacks

▪ Growth of cross-platform

autonomous malware designed to

operate on and between a variety of

mobile devices

FROM SMART TO SMARTER:

IMPACT: Autonomous malware that are designed to proactively spread between platforms

can have a devastating effect on our increasing reliance on connected devices

to automate and perform everyday tasks.

Page 5: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

5

Cyber Threat Prediction #2

IoT manufacturers will be held accountable for security breaches

▪ IoT is a cornerstone of the digital revolution, however IoT

manufacturers have flooded the market with highly insecure

devices

▪ More IOT devices are headless, which means users can’t

add a security client or even effectively update their software

or firmware

▪ Demand for creation and enforcement of security standards,

from consumers, vendors and other interest groups

IMPACT: If IoT manufacturers fail to secure their devices, consumers may begin to hesitate to buy.

IoT manufacturers need to take immediate and direct action, or suffer economic loss

and become targets of legislation

Page 6: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

6

Cyber Threat Prediction #3

▪ The weakest link in cloud security is the millions of

remote devices accessing cloud resources

▪ Increasing attacks targeting IoT devices with over 20

billion IoT devices online by 2020, versus one billion

PCs

▪ Expect to see attacks designed to compromise this

trust model by exploiting endpoint devices, resulting in

client side attacks that can breach cloud providers

20 billion IoT and endpoint devices are the weakest link for attacking the cloud

IMPACT: Cloud –based storage has expanded the potential attack service. Cloud providers need to

design networks with Layer 2 and 3 security technologies to segment the cloud between users,

control access, and protect the cloud providers’ internal network from their public offering

Page 7: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

7

Cyber Threat Prediction #4

▪ Hackers will target the growing number of building

automation and management systems

▪ Like with the IoT DDoS attacks, these exploits will

likely be blunt instrument attacks at first, such as

shutting down a building’s systems

▪ Attacks will grow more sophisticated – potential for

holding a building for ransom by locking the doors,

shutting off elevators, rerouting traffic, or

turning on the alarm system

Attackers will begin to turn up the heat in smart cities

IMPACT: Potential for massive civil disruption if integrated systems are compromised.

Trends point towards more interconnected critical infrastructure, such as

emergency services, traffic control, and IoT devices (such as self-driving cars)

Page 8: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

8

Cyber Threat Prediction #5

▪ Automated attacks introduce an economy of

scale to ransomware

▪ Hackers can cost-effectively extort small

amounts of money from multiple victims

simultaneously, especially by targeting

online IoT devices.

▪ Expect focused attacks against high-profile

targets, such as celebrities, political figures, and

large organizations

▪ Healthcare organizations are also a key target.

Patient records and human data cannot be so

easily replaced as credit cards

Ransomware was just the gateway malware

IMPACT: Ransomware affects everyone. Consumers will be reluctant to adopt new connected

devices if safety is not assured. Organizations must secure networks and

need to be held accountable for protecting sensitive information and human data.

Page 9: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

9

Cyber Threat Prediction #6

▪ The current shortage of skilled

cybersecurity professionals means that

many organizations looking to

participate in the digital economy will do

so at great risk

▪ Predict that savvy organizations will

turn to security consulting services that

can guide them through the labyrinth of

security

▪ Or to managed security services

providers, like MSSPs, who can provide

a turnkey security solution

Technology will have to close the gap on the critical cyber skills shortage

IMPACT: In today’s digital economy, businesses need to connect online or die. But many

organizations internally lack specialised staff with professional skills to protect their systems.

Security vendors need to rethink their traditional, siloed approach to developing security tools.

Page 10: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

10

FortiGuard Threat IntelligenceFortinet’s Value Proposition

Page 11: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

11

FortiGuard by the Numbers

Page 12: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

12

Application

Control Service

Intrusion

Prevention Service

Web

Filtering Service

Anti-spam

Security Service

Web

Security Service

Database

Security Service

IP Reputation

Service

Vulnerability

Management Service

FortiGuard Threat Intelligence

Antivirus Service

Page 13: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

13

FortiGuard Threat Intelligence - Sources

Preprocessing

Deduplication

False-positive removal

Packaging

Distribution

FortiGuardIntelligence

FortiCare

Commercial Feeds FortiCloud

FortiSandbox

Community Feeds

Internal ResearchCollaboration Partnerships

Fortiguard

Distribution

Network

Page 14: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

14

FortiGuard Threat Intelligence - Processing

Analyze samples

in sandbox

Unknown botnet

protocols analyzed

by AppCtrl team

Botnet C&C

URLs fed to Web

Filtering team

IP addresses and domains

fed to Botnet teams

Web Filtering Anti-Botnet Application Control

Antivirus

Page 15: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

15

Security Without CompromiseFortinet Security Fabric for End-to-End Protection

Page 16: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

16

THE EVOLVING DIGITAL ECONOMYTechnology is a strategic imperative

INFRASTRUCTURE

EVOLUTION

EVOLVING THREAT

LANDSCAPE

REGULATION, COMPLIANCE

AND CERTIFICATION

Page 17: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

17

NEW SECURITY STRATEGY:

Powerful

NEW SECURITY STRATEGY:

Seamless

NEW SECURITY STRATEGY:

Intelligent

SECURITY WITHOUT COMPROMISESecurity strategies must change

TODAY’S NETWORK

IS BORDERLESS

SLOW IS BROKEN COMPLEXITY IS

THE ENEMY OF

SECURITY

Page 18: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

18

NetworkEndpoint CloudApplicationAccess

Operations

Center

Advanced

Threat Intelligence

Fabric-Ready

THE FORTINET SECURITY FABRICThe Fortinet Security Fabric is the vision that delivers on the promise of Security without

Compromise: Intelligent, Powerful and Seamless

Page 19: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

19

Intelligent security is AWARE The Fortinet Security Fabric provides complete visibility, enabling network segmentation

VISIBILITY SEGMENTATIO

N

AUTOMATED

OPERATION

▪Single pane of glass for

full Fabric-wide policy

control

▪Create network

segments by trust

level

▪All infrastructure

including endpoints,

network, data center,

cloud and data

AWARE

Page 20: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

20

Powerful security is SCALABLE The Fortinet Security Fabric scales from IoT to the cloud

ENDPOINT CLOUDACCESS BRANCH CAMPUS

& DATA

CENTER

Embedded

SecurityEndpoint

Security

Private

Hybrid

Public

Multi-SPU

PoweredSPU

Powered

SCALABLE

SoC

NP CP

Page 21: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

21

Seamless security is ACTIONABLE The Fortinet Security Fabric provides cooperative security alerts, recommendations and audit reports

5

Critical5

Medium4

Advisory3

Rank Severity Recommendation

Zero-Day Vulnerability

Not Connected to Fabric

Logging DisabledRegulatory Template,

i.e. PCI

FABRIC ELEMENT

ALERT

AUDIT REPORT

ACTIONABLE

Page 22: Cyber Threat Predictions for 2017 - UNAM · 2017-03-21 · Expect focused attacks against high-profile targets, such as celebrities, political figures, and large organizations Healthcare

22