From Speaker Debora A. Plunkett, NSA
The key points were
Mobility à malware on mobile phones and use of mobiles as attack surface is quickly evolving. Enough time and money has to be spent on whitelisting of services as the dependency has increased on using technology and gadgets.
Application Focus à Expected to see more application focused attacks. Extensive focus to be given on hardening the applications. Hardening of the application could be time consuming for the developer.
IPv6à increased need of address space and moving from IPv4 to IPv6. Need to be prepared for the new attack trends that could originate.
Cloud based attacksà Means for providing and extending reputation to cloud based services is required. Standard and best practices to be implemented. Continuous monitoring to defend the cloud environment. Separate accreditation of could infrastructure and cloud based applications. Flexible accreditation for cloud infrastructure. Accreditation and certification for cloud infrastructure.
Counter attack culture evolving, and it is important to create awareness for the liability issues and the laws. The laws vary across the nations and the needs for clear laws. Unified effort and visibility is required to draw common laws and sharing of intrusion information.
Thanks,
Sudhamani