cybersecurity in 2020
play

Cybersecurity in 2020 A Reflection on the Previous Decade & How - PowerPoint PPT Presentation

Cybersecurity in 2020 A Reflection on the Previous Decade & How to Prepare for the Next Tech Terms Vulnerability Payload Exploit Advanced Persistent Threat Zero Day Exploit Dark Web Malware 5G Technology


  1. Cybersecurity in 2020 A Reflection on the Previous Decade & How to Prepare for the Next

  2. Tech Terms • Vulnerability • Payload • Exploit • Advanced Persistent Threat • Zero Day Exploit • Dark Web • Malware • 5G Technology Experts | Managed IT Services

  3. Previous 10 Years Most impactful cyber First industrial malware security event of the last that spied on and decade. Changed the way subverted industrial we try to protect data control systems The Corporate world First large retailer to learned the financial have their point of impact of poor security sale units infected practices. Started the trend of CYA terms of service clauses Technology Experts | Managed IT Services

  4. Previous 10 Years This hack leads to First widespread First time mass the development of vulnerability that was public shaming lead the site exploited immediately to users taking their haveibeenpwned.com before it could be own lives patched First widespread use of Largest cryptocurrency the term Advanced hack in history Persistent Threat (ATP) Technology Experts | Managed IT Services

  5. Previous 10 Years The start of First time a cyber hack Increase in hijacking your cell deeply impacted US ransomware phone number politics spawned an explosion of breach hunters First attack on a power Largest data breach in grid affecting a public history exposing up to utility and residential 3 billion records customers Technology Experts | Managed IT Services

  6. Previous 10 Years Largest monetary An APT ongoing for over 4 settlement in data years. Believed to target breach history at $700M US government officials (settled in 2019) The beginning of US Public and Small Crypto hijacking Business sectors hit hard by Ransomware Technology Experts | Managed IT Services

  7. Previous 10 Years Takeaway’s • Your personal data is likely exposed, protect yourself • Everything digital is at risk in this cat and mouse game • Monetary benefits of holding data ransom may shift to disrupting and damaging systems Technology Experts | Managed IT Services

  8. A Look Ahead Un Unin informe rmed d Exec Execut utiv ives es • Executives are one of a companies highest security risks • Ultimate accountability lies within business leadership • Lack of engagement and knowledge is high risk behavior • Cybersecurity understanding and awareness will be critical for all leadership and management roles Technology Experts | Managed IT Services

  9. A Look Ahead Gl Global l Polit litic ics • Continued cyber espionage • Nation state hacking will continue increasing the likelihood of impacting businesses • Businesses of all sizes are now on the cyberwar frontlines • Number of bad actors / hackers is likely to increase Technology Experts | Managed IT Services

  10. A Look Ahead Artif ifici icial al In Intelli lligence ce • Assist in lowering the time to detect threat actors • Humans need help to manage the vast number of devices coming online • Artificial Intelligence will assist in automating the monitoring, detection, management and prevention of cyber attacks Technology Experts | Managed IT Services

  11. A Look Ahead Vendors • 3 rd party IT vendors are targeted by cyber criminals • Cyber crime will impact your supply chains, especially by vendors with weak security practices • Take a zero-trust approach to 3 rd party access to your systems • Have checks and balances to mitigate risks Technology Experts | Managed IT Services

  12. A Look Ahead 5G 5G • More devices = more attack surface area • Faster networks = faster attack proliferation • Attacks could have huge impact due to interconnected systems Technology Experts | Managed IT Services

  13. A Look Ahead Priv ivacy cy • Privacy and cybersecurity regulations are increasing • Be clear about how you collect, store and protect your data • Data privacy varies between people of different generations Technology Experts | Managed IT Services

  14. A Look Ahead Not Takin ing g Actio ion • Everyone is vulnerable • It may mean losing your business • Cybersecurity is now part of the cost of doing business Technology Experts | Managed IT Services

  15. A Look Ahead Takeaway’s • Be cyber aware • Understand, control and audit vendor access d • Understand the type of data you collect, how you collect it and what you do with it • Work to increase cyber resilience internally and then within your supply chain Technology Experts | Managed IT Services

  16. Questions? Technology Experts | Managed IT Services

  17. Thank you! Jeremiah School 920-321-3622 jschool@weareinnova.com Technology Experts | Managed IT Services

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend