EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure ....
Transcript of EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure ....
![Page 1: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/1.jpg)
EXPECT THE UNEXPECTED Jon Clay Director, Global Threat Communications Trend Micro
#CLOUDSEC
![Page 2: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/2.jpg)
2
THE UNEXPECTED
WE’VE GOT NEXT-GEN THREAT DEFENCE!
Source: @MatiasKatz
![Page 3: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/3.jpg)
3
THREAT ACTORS
Organised Cybercrime
Industrial Espionage
Activists / Terrorists
State Sponsored
![Page 4: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/4.jpg)
TECHNOLOGY DISRUPTION How digital disruption will impact cybersecurity
#CLOUDSEC
![Page 5: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/5.jpg)
WHAT’S ONE THING IN COMMON HERE?
5
![Page 6: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/6.jpg)
EXPECT TECHNOLOGY DISRUPTION
6
“Digital disruption, when properly understood, should terrify you.”
James McQuivey Author of “Digital Disruption:
Unleashing the Next Wave of Innovation”
![Page 7: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/7.jpg)
DISRUPTION #1: CLOUD COMPUTING
7
Cloud computing has disrupted every industry it has touched. Enable more disruptive technologies to come.
Hackers will find and attack weaknesses in the building blocks and joints of cloud computing.
![Page 8: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/8.jpg)
DISRUPTION #2: MOBILE
8
“Every once in a while a revolutionary product comes along that changes everything.”
- Steve Jobs, 2007
Empowering Wearable Technologies, Location Sensing and Internet of Things (IoT) today.
Cybercriminals can strike their targets from anywhere. More entry points for them to infiltrate an unsecured system or network.
![Page 9: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/9.jpg)
DISRUPTION #3: BIG DATA
9
Organisations will use Big Data to satisfy their customers better.
Hackers will also use Big Data to exploit their victims better.
![Page 10: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/10.jpg)
DISRUPTION #4: SOCIAL MEDIA
10
Social media helps reach people easier and quicker.
Cybercriminals want to reach you similarly too.
![Page 11: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/11.jpg)
DISRUPTION #5: INTERNET OF THINGS
11
Anything and everything that connects with the Internet can be hacked.
IoT could be the “Network of all networks” in the future.
25 billion connected things by 2020 – Gartner
Immature and experimental now.
![Page 12: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/12.jpg)
UP AND COMING …
12
![Page 13: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/13.jpg)
THE FUTURE OF CYBER THREATS
What will it be like?
#CLOUDSEC
![Page 14: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/14.jpg)
THE FUTURE OF CYBER THREATS
14
Disruptive technologies will produce large, complex and intelligent hyper-connected networks.
Cybercriminals will follow technology disruption closely to develop and launch attacks in unexpected ways.
![Page 15: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/15.jpg)
THE FUTURE OF CYBER THREATS
15
Cloud-powered Botnets and DDoS
Attacks
Electronic Attacks on Critical
Infrastructure Micro-Criminality
Bio-hacks for Multi-factor
Authentication
Cyber-enabled Violence
Malware for Humans Cyber Gang Wars
High Impact, Targeted Identity Theft and Avatar
Hijack
Sophisticated Reputation
Manipulation
Misuse of Augmented Reality
Abuse of Unmanned
Vehicles and Smart Machines
Hacks against Internet of Things
with Direct Physical Impact
Source: Project 2020 by ICSPA, Europol and Trend Micro
![Page 16: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/16.jpg)
HOW CYBERSECURITY CAN PREVAIL Strategies for survival
16
![Page 17: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/17.jpg)
HOW CYBERSECURITY CAN PREVAIL
Strategies for survival
#CLOUDSEC
![Page 18: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/18.jpg)
18
BASIC INTERMEDIATE ADVANCED
Endpoint Security Network Segmentation
Firewall & IPS Web Security
Application Security
Two-Factor Authentication Mobile Security
Data Security
Advanced Threat
Detection Security Intelligence Network Forensics
Connected Threat Defence
SECURITY OPERATIONS
Access Management • Change Management • Vulnerability Management • Incident Response
DEFENDING AGAINST THE UNEXPECTED
![Page 19: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/19.jpg)
DEFENDING AGAINST THE UNEXPECTED
19
Assess Educate Identify gaps KPIs Continuous
Improvement Report
Action Plan for Cybersecurity Leaders
![Page 20: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/20.jpg)
20
THEN YOU CAN BE LIKE HIM …..
FEARLESS
![Page 21: EXPECT THE UNEXPECTED - cloudsec.com · Electronic Attacks on Critical Infrastructure . Micro-Criminality . Bio-hacks for Multi-factor Authentication . Cyber-enabled Violence . Malware](https://reader030.fdocuments.in/reader030/viewer/2022041015/5ec70397bf1f07279138601b/html5/thumbnails/21.jpg)
Jon Clay Director, Global Threat Communications Trend Micro