SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Securing the Cloud
Glenn Solomon
Feb 2016
• 1 team in the US and China
• $2.6 billion under management
• 6 funds | 150+ investments
• 15 years | 27 IPOs
GLEN N SOLOMON
• Managing Partner
• 10 years at GGV Capital
• Enterprise, SaaS, Cloud, Security, Mobile
• goinglongblog.com | @glennsolomon
Cybercrime is a Growth Industry
Source: 2015 Verizon DBIR Report; ITRC ; HP 2015 Cost of Cyber Crime Study; The Global State of Information Security Survey 2015; McAfee Net Losses –
Estimating the Cost of Cybercrime
42.8M
Security
Incidents
5,810
Confirmed
Data Breaches
61
Countries
$445B
Annual Cost
to the Global
Economy
Data Breaches by the Numbers
Data Records Lost or Stolen in 2014
2,803,306 records lost or stolen every day
116,793 records every hour
1,947 records every minute
32 records every second
Source: SafeNet – The Art of Data Protection, Feb 2015
Only 4% of breaches were “Secure
Breaches” where encryption was used
and the stolen data was rendered
useless
Data Breaches are across all Industries
Source: WSJ
Hackers & Their Weapons
Participants
Hackers
Hacktivists
Criminal Organizations
Commercial Vendors
State Sponsored Terror Groups
Available to Purchase
Hacking Tools
Zero-day Exploits
Credit Card Data
eCommerce/Social-
Media Credentials
Key Participants
Eastern Europe
Russia
China
US
Latin America
Source: RAND National Security Research Division
The Cybersecurity Landscape is Vast
Source: Momentum Partners
Common Threats & Victims
Identity Theft Phishing Social Engineering Cyber AttackCyber Extortion
When you protect your company, you need to focus on all possible weaknesses.
Hackers only need to find one way in…
The Corporate Challenge
Source: 2015 Verizon DBIR Report; BTIG Security Report – Attack of the Clones
Cloud-based
Applications
Social
Networking
Virtualization BYOD
83 million software
applications today;
141 million by 2017
Stolen or weak
credentials involved in
76% of cyber attacks
14% of attacks or
exploits are on cloud
services, applications,
or storage systems
Mobile security
breaches have
affected 65% of global
organizations in
the last 12 months
The Next Generation of Cyber Security
Source: BTIG Security Report – Attack of the Clones
Legacy Security Companies Next Generation Equivalent
Firewall/Intrusion Prevention System Next Generation Network Security
Antivirus Next Generation Endpoint/Malicious Detection
Web Gateway/URL Filtering Cloud Security & Data Protection
Authentication, Authorization &
Accounting
Identity & Access Management – The New Perimeter
Secure Event Management Security Intelligence & Analytics
Data Security Data Security, Discovery, Clarification, Control & Intel
Data Loss Prevention Inside Threat Protection
Governance, Risk Management &
Compliance
Compliance Automation and Data Governance
New Threat Vectors
Source: Immuniweb, Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report
Social Media Protection
While email remains a
significant attack vector, 70% of
social media scams were
manually shared.
Advanced Persistent Threats
Zero-day exploits are almost impossible
to detect and will work 9 out of 10
cases because they have legal, financial
and banking industry experts,
psychologists, and even ex-law
enforcement officers behind them.
Insider Threats
Privileged users, such as managers with
access to sensitive information, pose the
biggest insider threat to organizations.
This is followed by contractors,
consultants, and regular employees.
Compromised account credentials, or
when someone’s account is hijacked, are
also a big part of this risk.
New Threat Vectors
Internet of Things
These hubs, switches, and
router are increasingly used to
target the network. They have
processing, storage, and
internet connectivity.
Mobile Security &
Protection
As more users rely on their
mobile devices, more spam,
scams, and threats are tailored
to these devices. Mobile
malware such as bootkits will
become harder to remove.
Critical Infrastructure
The most significant trend is the
use of malware to compromise
supervisory control and data
acquisition (SCADA) systems,
including Homeless
Management Information
System (HMIS), historians, and
other connected devices.
Source: Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report
Approaches Over Time
1987-2009 2009-2014 2014 onward 2015 onward
Signatures Sandboxes Anomaly Detection Zero-Trust
APT
Attack Sophistication Level
Hammertoss, Black Energy, etc
Endpoint
Content
Network
Source: Based on Agari presentation material
Modern Security Challenges in the Cloud
Challenge: Corporate services are migrating to the cloud
Secure Application Access
Privileged Access
Management
Multi-Factor
Authentication
FirewallsNetwork Access Control SSO
Challenge: Dynamic workloads due to multi-tiered apps & virtualization, containers, micro-services, etc.
Protect Server to Server Interactions
Cloud Workload ManagementMachine Firewalls
Modern Security Challenges in the Cloud (cont)
Challenge: Employees on websites via HTTP and mail –some malicious
Securing Employee to Internet
Cloud Policy ManagementCloud Access Security Brokers SaaS Data Encryption
Challenge: Rapid development cycles leave little room for security checks
Web App Security
RASPsWAFs CDNs
Emerging Protection for Emerging Threats
Insider Threat Detection
Machine Learning to Spot Attacks
Industrial & Connected Device Security
Security Startups Raised $10.9B across 1074 Deals since 2010
Source: Momentum Partners, CB Insights
Additional Resources
Books Blogs
http://goinglongblog.com/
https://krebsonsecurity.com/
Q&A

Contenu connexe

Tendances

AppNexus' First Pitch Deck
AppNexus' First Pitch DeckAppNexus' First Pitch Deck
AppNexus' First Pitch DeckCamille Ricketts
 
WeWork Pitch Deck 2014
WeWork Pitch Deck 2014WeWork Pitch Deck 2014
WeWork Pitch Deck 2014startuphome
 
Tesla Investor Presentation - Model S
Tesla Investor Presentation - Model STesla Investor Presentation - Model S
Tesla Investor Presentation - Model Sstartuphome
 
Stripe Pitch Deck designed by Zlides
Stripe Pitch Deck designed by ZlidesStripe Pitch Deck designed by Zlides
Stripe Pitch Deck designed by ZlidesZlides
 
Zuora Sales Deck
Zuora Sales DeckZuora Sales Deck
Zuora Sales DeckRyan Gum
 
Fynd's Pre-Series-A Pitch Deck
Fynd's Pre-Series-A Pitch DeckFynd's Pre-Series-A Pitch Deck
Fynd's Pre-Series-A Pitch DeckPranav Divakar
 
The Future of Everything
The Future of EverythingThe Future of Everything
The Future of EverythingCharbel Zeaiter
 
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deckMonzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deckAA BB
 
The State of Enterprise Software
The State of Enterprise SoftwareThe State of Enterprise Software
The State of Enterprise SoftwareGreylock Partners
 
AppVirality.com - Investor Pitch Deck
AppVirality.com - Investor Pitch DeckAppVirality.com - Investor Pitch Deck
AppVirality.com - Investor Pitch DeckLaxman Papineni
 
Coinbase Seed Round Pitch Deck
Coinbase Seed Round Pitch DeckCoinbase Seed Round Pitch Deck
Coinbase Seed Round Pitch Deckstartuphome
 
How To Create A Successful Investment Pitch Deck by Piktochart and HighSpark
How To Create A Successful Investment Pitch Deck by Piktochart and HighSparkHow To Create A Successful Investment Pitch Deck by Piktochart and HighSpark
How To Create A Successful Investment Pitch Deck by Piktochart and HighSparkPiktochart
 
Manpacks Pitch Deck
Manpacks Pitch DeckManpacks Pitch Deck
Manpacks Pitch Deckstartuphome
 
The Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundThe Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundBen Lang
 
Kickfolio - 500Startups Batch 5
Kickfolio - 500Startups Batch 5Kickfolio - 500Startups Batch 5
Kickfolio - 500Startups Batch 5500 Startups
 
The 10 most interesting slides that helped our SaaS company raise 9 million
The 10 most interesting slides that helped our SaaS company raise 9 millionThe 10 most interesting slides that helped our SaaS company raise 9 million
The 10 most interesting slides that helped our SaaS company raise 9 millionGoCanvas
 

Tendances (20)

Simple. Friendly. Smart.
Simple. Friendly. Smart. Simple. Friendly. Smart.
Simple. Friendly. Smart.
 
N26 - NOAH16 London
N26 - NOAH16 LondonN26 - NOAH16 London
N26 - NOAH16 London
 
The AI Rush
The AI RushThe AI Rush
The AI Rush
 
AppNexus' First Pitch Deck
AppNexus' First Pitch DeckAppNexus' First Pitch Deck
AppNexus' First Pitch Deck
 
WeWork Pitch Deck 2014
WeWork Pitch Deck 2014WeWork Pitch Deck 2014
WeWork Pitch Deck 2014
 
Tesla Investor Presentation - Model S
Tesla Investor Presentation - Model STesla Investor Presentation - Model S
Tesla Investor Presentation - Model S
 
Stripe Pitch Deck designed by Zlides
Stripe Pitch Deck designed by ZlidesStripe Pitch Deck designed by Zlides
Stripe Pitch Deck designed by Zlides
 
Zuora Sales Deck
Zuora Sales DeckZuora Sales Deck
Zuora Sales Deck
 
Fynd's Pre-Series-A Pitch Deck
Fynd's Pre-Series-A Pitch DeckFynd's Pre-Series-A Pitch Deck
Fynd's Pre-Series-A Pitch Deck
 
The Future of Everything
The Future of EverythingThe Future of Everything
The Future of Everything
 
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deckMonzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
Monzo: £19.3M VC investment turned into $2B. Monzo's Series C pitch deck
 
The State of Enterprise Software
The State of Enterprise SoftwareThe State of Enterprise Software
The State of Enterprise Software
 
AppVirality.com - Investor Pitch Deck
AppVirality.com - Investor Pitch DeckAppVirality.com - Investor Pitch Deck
AppVirality.com - Investor Pitch Deck
 
Coinbase Seed Round Pitch Deck
Coinbase Seed Round Pitch DeckCoinbase Seed Round Pitch Deck
Coinbase Seed Round Pitch Deck
 
How To Create A Successful Investment Pitch Deck by Piktochart and HighSpark
How To Create A Successful Investment Pitch Deck by Piktochart and HighSparkHow To Create A Successful Investment Pitch Deck by Piktochart and HighSpark
How To Create A Successful Investment Pitch Deck by Piktochart and HighSpark
 
Manpacks Pitch Deck
Manpacks Pitch DeckManpacks Pitch Deck
Manpacks Pitch Deck
 
The Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed RoundThe Deck We Used to Raise $1M Seed Round
The Deck We Used to Raise $1M Seed Round
 
Kickfolio - 500Startups Batch 5
Kickfolio - 500Startups Batch 5Kickfolio - 500Startups Batch 5
Kickfolio - 500Startups Batch 5
 
The 10 most interesting slides that helped our SaaS company raise 9 million
The 10 most interesting slides that helped our SaaS company raise 9 millionThe 10 most interesting slides that helped our SaaS company raise 9 million
The 10 most interesting slides that helped our SaaS company raise 9 million
 
Apple: The Next King of Search By Ian Sefferman
Apple: The Next King of Search By Ian SeffermanApple: The Next King of Search By Ian Sefferman
Apple: The Next King of Search By Ian Sefferman
 

En vedette

Rethinking Transformational Change
Rethinking Transformational ChangeRethinking Transformational Change
Rethinking Transformational ChangeJason Little
 
31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & OfflinePixc
 
TEDxSanFrancisco – Review
TEDxSanFrancisco – ReviewTEDxSanFrancisco – Review
TEDxSanFrancisco – ReviewNiki Skene
 
Net neutrality: The Basics
Net neutrality: The BasicsNet neutrality: The Basics
Net neutrality: The BasicsInterQuest Group
 
The Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaThe Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaFuture Insights
 
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...AdNerds
 
Business optimization | building your first million is easy
Business optimization | building your first million is easyBusiness optimization | building your first million is easy
Business optimization | building your first million is easySurjeet Singh
 
Innovation Enablers: Culture, Community & Code
Innovation Enablers: Culture, Community & Code Innovation Enablers: Culture, Community & Code
Innovation Enablers: Culture, Community & Code Angel Diaz
 
Kuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesKuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesEric Tachibana
 
ADP ReThink 2016: Evolution of Work
ADP ReThink 2016: Evolution of WorkADP ReThink 2016: Evolution of Work
ADP ReThink 2016: Evolution of WorkADP, LLC
 
Facebook et la présidentielle 2012
Facebook et la présidentielle 2012Facebook et la présidentielle 2012
Facebook et la présidentielle 2012Publicis Consultants
 
Enterprise 2.0 @ Sun Microsystems
Enterprise 2.0 @ Sun MicrosystemsEnterprise 2.0 @ Sun Microsystems
Enterprise 2.0 @ Sun MicrosystemsPeter H. Reiser
 
Vers une architecture de l'information
Vers une architecture de l'informationVers une architecture de l'information
Vers une architecture de l'informationAndrea Resmini
 
Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroIBM Security
 
Offline is the new online - Le futur d'internet n'est plus derrière un écran
Offline is the new online - Le futur d'internet n'est plus derrière un écranOffline is the new online - Le futur d'internet n'est plus derrière un écran
Offline is the new online - Le futur d'internet n'est plus derrière un écranCedric Giorgi
 
Understanding strategy in innovation and technology oriented business
Understanding strategy in innovation and technology oriented businessUnderstanding strategy in innovation and technology oriented business
Understanding strategy in innovation and technology oriented businessDurgarao Gundu
 
Knowledge Management: Putting Information to Good Use
Knowledge Management: Putting Information to Good UseKnowledge Management: Putting Information to Good Use
Knowledge Management: Putting Information to Good UseSlideShop.com
 
The Future of Education is Digital
The Future of Education is DigitalThe Future of Education is Digital
The Future of Education is DigitalPaul Brown
 

En vedette (20)

Rethinking Transformational Change
Rethinking Transformational ChangeRethinking Transformational Change
Rethinking Transformational Change
 
31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline
 
TEDxSanFrancisco – Review
TEDxSanFrancisco – ReviewTEDxSanFrancisco – Review
TEDxSanFrancisco – Review
 
Net neutrality: The Basics
Net neutrality: The BasicsNet neutrality: The Basics
Net neutrality: The Basics
 
The Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaThe Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'Shea
 
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
Facebook, LinkedIN & Beyond - or how the new media changed how sales people d...
 
Business optimization | building your first million is easy
Business optimization | building your first million is easyBusiness optimization | building your first million is easy
Business optimization | building your first million is easy
 
Innovation Enablers: Culture, Community & Code
Innovation Enablers: Culture, Community & Code Innovation Enablers: Culture, Community & Code
Innovation Enablers: Culture, Community & Code
 
Innovating supply chains in Asia
Innovating supply chains in AsiaInnovating supply chains in Asia
Innovating supply chains in Asia
 
Kuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesKuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employees
 
ADP ReThink 2016: Evolution of Work
ADP ReThink 2016: Evolution of WorkADP ReThink 2016: Evolution of Work
ADP ReThink 2016: Evolution of Work
 
Facebook et la présidentielle 2012
Facebook et la présidentielle 2012Facebook et la présidentielle 2012
Facebook et la présidentielle 2012
 
Enterprise 2.0 @ Sun Microsystems
Enterprise 2.0 @ Sun MicrosystemsEnterprise 2.0 @ Sun Microsystems
Enterprise 2.0 @ Sun Microsystems
 
Vers une architecture de l'information
Vers une architecture de l'informationVers une architecture de l'information
Vers une architecture de l'information
 
Infographic: Cloud Security Superhero
Infographic: Cloud Security SuperheroInfographic: Cloud Security Superhero
Infographic: Cloud Security Superhero
 
Brennpunkt2015 Neuburger
Brennpunkt2015 NeuburgerBrennpunkt2015 Neuburger
Brennpunkt2015 Neuburger
 
Offline is the new online - Le futur d'internet n'est plus derrière un écran
Offline is the new online - Le futur d'internet n'est plus derrière un écranOffline is the new online - Le futur d'internet n'est plus derrière un écran
Offline is the new online - Le futur d'internet n'est plus derrière un écran
 
Understanding strategy in innovation and technology oriented business
Understanding strategy in innovation and technology oriented businessUnderstanding strategy in innovation and technology oriented business
Understanding strategy in innovation and technology oriented business
 
Knowledge Management: Putting Information to Good Use
Knowledge Management: Putting Information to Good UseKnowledge Management: Putting Information to Good Use
Knowledge Management: Putting Information to Good Use
 
The Future of Education is Digital
The Future of Education is DigitalThe Future of Education is Digital
The Future of Education is Digital
 

Similaire à Securing the Cloud

Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 

Similaire à Securing the Cloud (20)

Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 

Plus de GGV Capital

THE DIGITAL ECONOMY INDEX 2021
THE DIGITAL ECONOMY INDEX 2021THE DIGITAL ECONOMY INDEX 2021
THE DIGITAL ECONOMY INDEX 2021GGV Capital
 
THE DIGITAL ECONOMY INDEX 2020
THE DIGITAL ECONOMY INDEX 2020THE DIGITAL ECONOMY INDEX 2020
THE DIGITAL ECONOMY INDEX 2020GGV Capital
 
Lessons from US & China for Global Entrepreneurs
Lessons from US & China for Global EntrepreneursLessons from US & China for Global Entrepreneurs
Lessons from US & China for Global EntrepreneursGGV Capital
 
Hans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
Hans Y Combinator Presentation on Lessons from China for Global EntrepreneursHans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
Hans Y Combinator Presentation on Lessons from China for Global EntrepreneursGGV Capital
 
WSJ Converge 2017 Final: China Frontier Tech Trends
WSJ Converge 2017 Final: China Frontier Tech TrendsWSJ Converge 2017 Final: China Frontier Tech Trends
WSJ Converge 2017 Final: China Frontier Tech TrendsGGV Capital
 
Evolving Ecommerce NYC Summit Quotes
Evolving Ecommerce NYC Summit QuotesEvolving Ecommerce NYC Summit Quotes
Evolving Ecommerce NYC Summit QuotesGGV Capital
 
Evolving Enterprise Highlights
Evolving Enterprise HighlightsEvolving Enterprise Highlights
Evolving Enterprise HighlightsGGV Capital
 
2016 Year in Review
2016 Year in Review2016 Year in Review
2016 Year in ReviewGGV Capital
 
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016GGV Capital
 
GGV Capital 2015 Year in Review
GGV Capital 2015 Year in ReviewGGV Capital 2015 Year in Review
GGV Capital 2015 Year in ReviewGGV Capital
 
Monetization in the US and China: Where to Invest
Monetization in the US and China: Where to InvestMonetization in the US and China: Where to Invest
Monetization in the US and China: Where to InvestGGV Capital
 
The Mobile Generation: China's Millennials
The Mobile Generation: China's MillennialsThe Mobile Generation: China's Millennials
The Mobile Generation: China's MillennialsGGV Capital
 
GGV Capital Cross-Border Opportunities
GGV Capital Cross-Border OpportunitiesGGV Capital Cross-Border Opportunities
GGV Capital Cross-Border OpportunitiesGGV Capital
 
GGV Capital Mobile Trends Review
GGV Capital Mobile Trends ReviewGGV Capital Mobile Trends Review
GGV Capital Mobile Trends ReviewGGV Capital
 
Silicon Valley and Emerging Markets
Silicon Valley and Emerging Markets Silicon Valley and Emerging Markets
Silicon Valley and Emerging Markets GGV Capital
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
State of the US VC Market
State of the US VC MarketState of the US VC Market
State of the US VC MarketGGV Capital
 
GGV Capital Viewpoint: Internet of Things
GGV Capital Viewpoint: Internet of ThingsGGV Capital Viewpoint: Internet of Things
GGV Capital Viewpoint: Internet of ThingsGGV Capital
 
Sales and Marketing 3.0: The High Velocity Model
Sales and Marketing 3.0: The High Velocity ModelSales and Marketing 3.0: The High Velocity Model
Sales and Marketing 3.0: The High Velocity ModelGGV Capital
 
GGV Capital Year in Review 2014
GGV Capital Year in Review 2014GGV Capital Year in Review 2014
GGV Capital Year in Review 2014GGV Capital
 

Plus de GGV Capital (20)

THE DIGITAL ECONOMY INDEX 2021
THE DIGITAL ECONOMY INDEX 2021THE DIGITAL ECONOMY INDEX 2021
THE DIGITAL ECONOMY INDEX 2021
 
THE DIGITAL ECONOMY INDEX 2020
THE DIGITAL ECONOMY INDEX 2020THE DIGITAL ECONOMY INDEX 2020
THE DIGITAL ECONOMY INDEX 2020
 
Lessons from US & China for Global Entrepreneurs
Lessons from US & China for Global EntrepreneursLessons from US & China for Global Entrepreneurs
Lessons from US & China for Global Entrepreneurs
 
Hans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
Hans Y Combinator Presentation on Lessons from China for Global EntrepreneursHans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
Hans Y Combinator Presentation on Lessons from China for Global Entrepreneurs
 
WSJ Converge 2017 Final: China Frontier Tech Trends
WSJ Converge 2017 Final: China Frontier Tech TrendsWSJ Converge 2017 Final: China Frontier Tech Trends
WSJ Converge 2017 Final: China Frontier Tech Trends
 
Evolving Ecommerce NYC Summit Quotes
Evolving Ecommerce NYC Summit QuotesEvolving Ecommerce NYC Summit Quotes
Evolving Ecommerce NYC Summit Quotes
 
Evolving Enterprise Highlights
Evolving Enterprise HighlightsEvolving Enterprise Highlights
Evolving Enterprise Highlights
 
2016 Year in Review
2016 Year in Review2016 Year in Review
2016 Year in Review
 
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
GGV Capital Jenny Lee: Next Gen Wearables, Transportation and Robotics June 2016
 
GGV Capital 2015 Year in Review
GGV Capital 2015 Year in ReviewGGV Capital 2015 Year in Review
GGV Capital 2015 Year in Review
 
Monetization in the US and China: Where to Invest
Monetization in the US and China: Where to InvestMonetization in the US and China: Where to Invest
Monetization in the US and China: Where to Invest
 
The Mobile Generation: China's Millennials
The Mobile Generation: China's MillennialsThe Mobile Generation: China's Millennials
The Mobile Generation: China's Millennials
 
GGV Capital Cross-Border Opportunities
GGV Capital Cross-Border OpportunitiesGGV Capital Cross-Border Opportunities
GGV Capital Cross-Border Opportunities
 
GGV Capital Mobile Trends Review
GGV Capital Mobile Trends ReviewGGV Capital Mobile Trends Review
GGV Capital Mobile Trends Review
 
Silicon Valley and Emerging Markets
Silicon Valley and Emerging Markets Silicon Valley and Emerging Markets
Silicon Valley and Emerging Markets
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
State of the US VC Market
State of the US VC MarketState of the US VC Market
State of the US VC Market
 
GGV Capital Viewpoint: Internet of Things
GGV Capital Viewpoint: Internet of ThingsGGV Capital Viewpoint: Internet of Things
GGV Capital Viewpoint: Internet of Things
 
Sales and Marketing 3.0: The High Velocity Model
Sales and Marketing 3.0: The High Velocity ModelSales and Marketing 3.0: The High Velocity Model
Sales and Marketing 3.0: The High Velocity Model
 
GGV Capital Year in Review 2014
GGV Capital Year in Review 2014GGV Capital Year in Review 2014
GGV Capital Year in Review 2014
 

Dernier

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 

Dernier (20)

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 

Securing the Cloud

  • 1. Securing the Cloud Glenn Solomon Feb 2016
  • 2. • 1 team in the US and China • $2.6 billion under management • 6 funds | 150+ investments • 15 years | 27 IPOs GLEN N SOLOMON • Managing Partner • 10 years at GGV Capital • Enterprise, SaaS, Cloud, Security, Mobile • goinglongblog.com | @glennsolomon
  • 3. Cybercrime is a Growth Industry Source: 2015 Verizon DBIR Report; ITRC ; HP 2015 Cost of Cyber Crime Study; The Global State of Information Security Survey 2015; McAfee Net Losses – Estimating the Cost of Cybercrime 42.8M Security Incidents 5,810 Confirmed Data Breaches 61 Countries $445B Annual Cost to the Global Economy
  • 4. Data Breaches by the Numbers Data Records Lost or Stolen in 2014 2,803,306 records lost or stolen every day 116,793 records every hour 1,947 records every minute 32 records every second Source: SafeNet – The Art of Data Protection, Feb 2015 Only 4% of breaches were “Secure Breaches” where encryption was used and the stolen data was rendered useless
  • 5. Data Breaches are across all Industries Source: WSJ
  • 6. Hackers & Their Weapons Participants Hackers Hacktivists Criminal Organizations Commercial Vendors State Sponsored Terror Groups Available to Purchase Hacking Tools Zero-day Exploits Credit Card Data eCommerce/Social- Media Credentials Key Participants Eastern Europe Russia China US Latin America Source: RAND National Security Research Division
  • 7. The Cybersecurity Landscape is Vast Source: Momentum Partners
  • 8. Common Threats & Victims Identity Theft Phishing Social Engineering Cyber AttackCyber Extortion When you protect your company, you need to focus on all possible weaknesses. Hackers only need to find one way in…
  • 9. The Corporate Challenge Source: 2015 Verizon DBIR Report; BTIG Security Report – Attack of the Clones Cloud-based Applications Social Networking Virtualization BYOD 83 million software applications today; 141 million by 2017 Stolen or weak credentials involved in 76% of cyber attacks 14% of attacks or exploits are on cloud services, applications, or storage systems Mobile security breaches have affected 65% of global organizations in the last 12 months
  • 10. The Next Generation of Cyber Security Source: BTIG Security Report – Attack of the Clones Legacy Security Companies Next Generation Equivalent Firewall/Intrusion Prevention System Next Generation Network Security Antivirus Next Generation Endpoint/Malicious Detection Web Gateway/URL Filtering Cloud Security & Data Protection Authentication, Authorization & Accounting Identity & Access Management – The New Perimeter Secure Event Management Security Intelligence & Analytics Data Security Data Security, Discovery, Clarification, Control & Intel Data Loss Prevention Inside Threat Protection Governance, Risk Management & Compliance Compliance Automation and Data Governance
  • 11. New Threat Vectors Source: Immuniweb, Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report Social Media Protection While email remains a significant attack vector, 70% of social media scams were manually shared. Advanced Persistent Threats Zero-day exploits are almost impossible to detect and will work 9 out of 10 cases because they have legal, financial and banking industry experts, psychologists, and even ex-law enforcement officers behind them. Insider Threats Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations. This is followed by contractors, consultants, and regular employees. Compromised account credentials, or when someone’s account is hijacked, are also a big part of this risk.
  • 12. New Threat Vectors Internet of Things These hubs, switches, and router are increasingly used to target the network. They have processing, storage, and internet connectivity. Mobile Security & Protection As more users rely on their mobile devices, more spam, scams, and threats are tailored to these devices. Mobile malware such as bootkits will become harder to remove. Critical Infrastructure The most significant trend is the use of malware to compromise supervisory control and data acquisition (SCADA) systems, including Homeless Management Information System (HMIS), historians, and other connected devices. Source: Symantec Internet Security Threat Report 2015; Crowd Research Partners – Insider Threat Report
  • 13. Approaches Over Time 1987-2009 2009-2014 2014 onward 2015 onward Signatures Sandboxes Anomaly Detection Zero-Trust APT Attack Sophistication Level Hammertoss, Black Energy, etc Endpoint Content Network Source: Based on Agari presentation material
  • 14. Modern Security Challenges in the Cloud Challenge: Corporate services are migrating to the cloud Secure Application Access Privileged Access Management Multi-Factor Authentication FirewallsNetwork Access Control SSO Challenge: Dynamic workloads due to multi-tiered apps & virtualization, containers, micro-services, etc. Protect Server to Server Interactions Cloud Workload ManagementMachine Firewalls
  • 15. Modern Security Challenges in the Cloud (cont) Challenge: Employees on websites via HTTP and mail –some malicious Securing Employee to Internet Cloud Policy ManagementCloud Access Security Brokers SaaS Data Encryption Challenge: Rapid development cycles leave little room for security checks Web App Security RASPsWAFs CDNs
  • 16. Emerging Protection for Emerging Threats Insider Threat Detection Machine Learning to Spot Attacks Industrial & Connected Device Security
  • 17. Security Startups Raised $10.9B across 1074 Deals since 2010 Source: Momentum Partners, CB Insights
  • 19. Q&A