https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Digital Service Providers
  • Cloud Service Providers
  • CHANNEL PARTNERS ONLINE
 Channel Futures

Sales & Marketing


Live Blog: Kaspersky Cyber Security Summit 2013

  • Written by The VAR Guy 1
  • January 30, 2013
Kaserspky Lab CEO Eugene Kaspersky and his team are in New York today, telling potential customers and partners how cyber warfare impacts corporate IT security. The speaker lineup includes Howard Schmidt, former cyber-security coordinator for the Obama Administration.

Kaserspky Lab CEO Eugene Kaspersky and his team are in New York today, telling potential customers and partners how cyber warfare impacts corporate IT security. The speaker lineup includes Howard Schmidt, former cyber-security coordinator for the Obama Administration. Side note: Kaspersky Lab has been developing its own secure operating system to protect nuclear reactors, electric grids and other mission-critical infrastructure. Given today’s event location, it’s a safe bet Kaspersky Lab also wants to engage Wall Street and financial services customers. Here’s a live blog from the event.

Today’s gathering arrives ahead of the Kaspersky Lab Partner Summit (Feb. 7-10, Cancun, Mexico), one of The VAR Guy’s Top 100 Channel Partner Conferences for 2013. The VAR Guy’s guidance for partners: Read the blog below, take some notes, then go armed to the Kaspersky Lab Partner Summit to determine how the trends below will potentially impact your customers’ businesses.

Note: Check this blog often as each area will be updated throughout the day.

Recap: Eugene Kaspersky and Schmidt discussing cyber-warefare’s impact on corporate IT security.

  • 2012: Red October and other cyber warfare and espionage attacks emerged. The myth of Mac security invincibility ended.
  • What industries are most vulnerable to attack? Kaspersky said his mind is caught in an “endless loop” trying to answer the question, but power, telecommunications, transportation and military come to mind.
  • There are not enough IT security experts and educated professionals. “We need more and more experts,” said Kaspersky.
  • But, he conceded we must balance security with freedom, and each industry may require a different balance.
  • Schmidt walked attendees through some horror scenarios involving transportation systems going dark and airlines essentially being stranded. Real warm and fuzzy stuff.
  • Back in the 1980s there were was a war dialer that attacked a city grid and turned all the traffic signals green. “When you look at that category it’s different than someone trying to steal” your business plans. “But the fundamental vulnerabilities are the same in all industries.” The solutions are always similar but the vectors from which they emerge may be different.
  • Can security keep up with constant innovation, such as Google’s self-driven car? “I hope I will die before the end of technology innovation,” quipped Kaspersky.
  • Worst-case scenarios for cyber terrorism have yet to play out, concluded Kaspersky.

Recap: Costin Raiu, director of global research and analysis team, Kaspersky Lab

  • Cyber criminals are increasingly chasing money.
  • Nation states, however, are driven by something else.
  • It costs several hundred billion dollars to make nuclear bombs, but cyber warfare is much less expensive.
  • In 2009, the Aurora operation attacked Google, Adobe, Juniper, Yahoo, Morgan Stanley, Dow Chemical and more.
  • Also read up on DuQu in 2011.
  • Gauss-oriented attack is a nation state sponsored malware attack. It is stealing banking credentials. They apparently were trying to find information about how financial organizations move money around to pinpoint weak points. But ultimately, the true purpose of the technology is unknown. There is an encrypted warhead deep inside — the best minds are trying to crack the encryption and everyone has failed.
  • The latest malware worth watching is Red October. Kaspersky spotted the malware in 2012. Diplomatic institutions — embassies — were targeted. One module steals information from iPhones, Android and Windows phones.
  • Three dangers of cyber warfare: (1) Ideas from cyber weapons can be re-purposed and copied. (2) Companies become collateral victims in the cyber war between superpowers. (3) Cybercriminals start using weaponized exploits that were originally developed by governments.
  • Against military grade weapons you want the best available defense technologies. The keywords you want to look at include Patch. Whitelist. Default deny. Exploit prevention.0-day defense. Realtime protection. Cloud protection. Perimeter. Green zone. Raise awareness. Access control. Education. “Without education and awareness bad things turn into catastrophes.

Recap: Cyber-security realities in the corporate world (extended panel)

Panelists include…

  • Andy Steingruebl, senior manager, customer and ecosystem security, paypal
  • Eddie Schwartz, CISO, RSA
  • Adrian Stone, director, security response, RIM/BlackBerry
  • Costin Raiu, director, global research and analysis team, Kaspersky Lab
Key discussion points

  • The number of true attacks are likely 5 times larger than reported.
  • What chance do SMBs have amid cyber attacks? The cost of exploitation falls every day.
  • Humans are now high-value targets, as are their BYOD devices.
  • Businesses should invest more in application security  testing.
  • In the old days of security, you tried to get visibility and control in your data center. Now you’ve got a bunch of service providers you need to trust.
  • Adoption rate for full-disk encryption has skyrocketed thanks to regulations.
  • Bug bounty programs incent hackers to report bugs to companies rather than using the vulnerabilities for malicious intent.
  • BYOD: We haven’t evolved mobile strategy and innovation to the point where we can say bring your own device, do your fun stuff, and have corporations effectively protect the device.
  • BYOD is Like GMYD: Give Me Your Device — as in the corporation wants to control it.
  • How do you maintain great user experience even as you manage BYOD? Big panel debate.
  • Have a crisis plan before you need it.
  • Don’t underestimate the impact of cloud computing, where data lives, and who manages it.
  • How do you use Big Data to look into uncertainty, detecting potential threats and then mitigating them?
  • Mobile device management, encryption and patch management with a solid password policy can do a lot to mitigate the risks.
Lawrence Orans, research director, Gartner

  • He offered a list of the biggest attacks and incidents of 2012. The VAR Guy will post that list later.
  • Changes in malware involve the attacks becoming very, very targeted.
  • How are Botnet’s formed and why are they financially profitable? Orans explained it step by step. The VAR Guy has a photo of the process. Nasty stuff. More later.
  • Three- to five-percent of corporate PCs at any given time have been compromised by botnets. Roughly 20 to 30 percent of consumer-grade PCs have suffered from botnets.
  • Three ways to protect BYOD devices: MDM, hosted virtual desktops and network access control.
  • Anti-spam companies becoming cloud application brokers: Web filtering, anti-malware, DLP, identity services, encryption services, devices profiling, audit and logging.
Petr Merkulov, Chief Product Officer: He’s Launching Kaspersky Endpoint Security for Business

  • Businesses want three things: Agility (move fast, be nimble and flexible); efficiency (cut costs, consolidate and streamline) and productivity (maximize the value of existing resources; do more with less).
  • Malware gets in the way of all that. There are more than 200,000 new samples daily. There are more than 35,000 malicious programs that target mobile devices.
  • The new offering includes encryption, mobile security and MDM. It’s all in one dashboard/console. MDM piece involves security, full-visibility, policy enforcement. Container technology allows corporate applications to be separate from a user’s private BYOD applications. You can draw a line between corporate and consumer data. That also allows content to be selectively wiped if the device is lost or stolen.
  • In terms of systems management, there’s systems provisioning, vulnerability scanning, license management, remote tools, patching and network admission control.

Keep checking back for updates.

Tags: Cloud Service Providers Digital Service Providers MSPs VARs/SIs Cloud Sales & Marketing Security

Related


  • VDI
    IGEL Integrates Amazon WorkSpaces DaaS with Its Virtual Endpoint OS
    Also, the new Arm-based Raspberry Pi, co-developed by Citrix, IGEL and NComputing, is generally available.
  • Job cuts
    Latest VMware Job Cuts Impact More Workers in California
    The layoffs will begin March 30.
  • Hottest Ticket in Town
    Channel Partners Virtual 2021 Is the Hottest Ticket in Town
    And that means any town, since it’s 100% online. Will you be there?
  • strong customer relationship
    Datto Partners with ThreatLocker for Secure MSP Business Operations
    MSPs have seen increased security risks for clients amid COVID-19.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • OneLogin Hires Juniper Networks Vet to Lead Accelerate Partner Program
  • Fortinet Vet Geoff Kreiling Departs for Deep Instinct
  • Over 6,000 VMware vCenter Devices Exposed by Critical Vulnerabilities
  • Three Ways MSPs Can Improve Supply Chain Security

Galleries

View all

Channel Partners Virtual 2021 Is the Hottest Ticket in Town

February 26, 2021

Industry Perspectives

View all

The “Roaring 20s” Are Coming

February 25, 2021

Three Ways MSPs Can Improve Supply Chain Security

February 24, 2021

SASE: The Key to Mitigating Business Transformation Risk

February 22, 2021

Webinars

View all

A Partner’s Perspective on Channel Success in 2021

March 17, 2021

XDR and Why it Matters to MSPs

March 24, 2021

Top Security Trends Impacting Technology Security Providers In 2021

March 25, 2021

White Papers

View all

Ready To Add Cutting Edge IoT Solutions To Your Portfolio?

  • 1
February 25, 2021

What Is The Value Of Distribution For The Internet Of Things?

February 25, 2021

The Internet of Things (IoT): Where do You Begin?

  • 1
February 25, 2021

Upcoming Events

View all

Channel Partners Virtual

March 2, 2021 - March 4, 2021

Channel Partners Conference & Expo

November 1, 2021 - November 4, 2021

Videos and Fastchats

View all

FASTCHAT: How SOAR Eliminates Security Challenges and Elevates Service Provider Revenues

January 6, 2021

Happy Holidays from Channel Partners & Channel Futures!

December 21, 2020

FASTCHAT: How Old, Unpatched Technologies Are Creating New Security Threats for MSPs and Their Customers

December 3, 2020

Twitter

ChannelFutures

Amazon WorkSpaces @awscloud DaaS client will be available on @IGEL_Technology virtual endpoint client OS.… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

.@VMware cutting more workers in California as part of ongoing #workforcerebalancing. #layoffs… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

#CPVirtual is March 2-4. It’s the hottest ticket in town — any town, since it’s 100% online — so make sure you have… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

.@datto, @ThreatLocker partner to streamline #MSP secure business operations. dlvr.it/RtYvJK https://t.co/nKGnwbblNO

February 26, 2021
ChannelFutures

Infographic: Why Partner with Sierra Wireless and GetWireless? dlvr.it/RtYh1m https://t.co/KcBFzXIx7l

February 26, 2021
ChannelFutures

Infographic: The Sierra Wireless Essential Series dlvr.it/RtYgxv https://t.co/CatxbRHzXr

February 26, 2021
ChannelFutures

#Threatprotection is no small matter for #MSSPs. Find out what vendors say you have to do this year to protect your… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

Cloud strategies and cybersecurity are key, and #COVID19 will have more impact than #Brexit on U.K. channel, says… twitter.com/i/web/status/1…

February 26, 2021

MSSP Insider

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Channel Partners Online

Want more? Find more channel news and analysis on our sister site, Channel Partners.

Media Kit And Advertising

Want to reach our audience? Access our media kit

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Online
  • Channel Partners Events
  • MSP 501
  • MSSP Insider
  • IoT World Today
  • Webhostingtalk

WORKING WITH US

  • Contact
  • About us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X