SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
COVID-19, Evolving Cyber Threats
How this evolving event shapes the cyber security and threat landscapes
Monday, 11th April 2020.
Arun Kannoth
Senior Presales, Solution Architect – Technology & Platforms
LinkedIn | arunkan@outlook.com | +974 3001 8009
| Presented By
| Agenda
• COVID-19, Situation at a Glance
• Some Cyber Security FAQs During COVID-19
• Cyber Attacks – Evolving Causes
• Hacker’s View on COVID-19
• Cyber Attacks During COVID-19
• COVID-19 in Enterprises’ Eye
• Future Cyber Security Coverage
• Discussions
Covid-19, Situation at a Glance
Where are we heading to?
| COVID-19, Recent History of Pandemics
Pandemic - Today and a bit from history.
COVID-19 As of Today, 11th April 2020 Recent History of Pandemics
| COVID-19, Projected Global GDP Impacts
“Global GDP 2020
could slide or fall
sharply due to
COVID-19 outbreak.”
“Situation is very
dynamic, an accurate
prediction would be
challenging.”
As of 23rd March 2020
| COVID-19, Projected Industry Impacts
“Banking, Financial
Services, Insurance
and Public Sector are
predicted to be more
resilient.”
“This is ‘as of now’,
more impacts of
pandemic is yet to
come out.”
As of 23rd March 2020
Cyber Security FAQs, COVID-19
Significant questions for Cyber Security researchers.
| Cyber Security FAQs During COVID-19
Would any human be able
to even think of taking
advantage of such a sad
situation?
Should the cyber security
experts address a pandemic
situation that comes very
rarely?
Are there any serious cyber
security attacks taking place
leveraging the COVID-19
panic?
How is the present posture
of organizations during
COVID in a Cyber Security
perspective?
How the organizations are
likely to handle the
emerging COVID-19
situation?
What are the future
transformations areas for
the Cyber Security Experts
to consider?
1
2
3
4
5
6
Cyber Attacks - Evolving Causes
Why hackers are taking advantage of this alarming situation?
| Cyber Attack Causes, Evolution
When the humanity is fighting pandemic, some people are busy exploiting. Why?
Experimental Individual Organized Business Political1 2 3 4 5
• Tweaking into
computers
• Destruction of data
• Corrupt files
• Stealing information
• Stealing files
• Gaining control over
computers
• Destroying websites
• Monetize Data
• Monetize Personal
Details
• Monetize Official
Information
• Target Enterprises
• Form Hacking Groups
• Contract Attacks and
Monetize
• Research AI and ML
• Sponsored by Govt.
• Highly organized
• Targeting Economies
• Targeting Researches
• Weaponized AI and
ML
Early Developing Developed Advancing Advanced
. .
. .
• Tweaking into
computers
• Destruction of data
• Corrupt files
• Stealing information
• Stealing files
• Gaining control over
computers
• Destroying websites
Hackers’ View on COVID-19
How cyber criminals approaching a pandemic?
| A Pandemic is a Perfect Time
Shortage of
hardware
Shortage of
security systems
Shortage of
human skills
Pending, Delayed
Project deliveries
Increase of
manipulated news
Increased supply
chain failures
Increase of
dissatisfied staff
A pandemic brings a lot of panic and disruption. It’s a stress and vulnerability test for organizations.
Shortage of
budget
Cyber Attacks During COVID-19
How cyber attackers have been exploiting the situation?
Phishing
Emails
Malware
Ransom
ware
DOS
attacks
Trojan
| Hackers Capitalizing The COVID-19 Panic
Spikes of cyber attacks are observed during early 2020 and still going on.
Enterprises’ compromises due to sudden
upscaling of devices and VPNs
Leveraging the softened networks, their
never-tested theoretical BC policies
Policy compliance violations, outdated
software in the end-user machines
3
4
5
Forced adoption of technology across
comparatively less tech-savvy people2
Panic situation, The curious nature of the
human psyche in times of uncertainty1
| Expert Studies During COVID-19
Most frequently used methods for deployment of malware.
Emails
Bad domains, Web Links
Malicious AttachmentsApps, Text Messages
| Research By
| Spikes in Domain Registrations
There is a sudden increase in creating domains, luring users to COVID-19 topics.
United Nations1
Banks, Insurance4
Health Organizations3
Governmental Agencies2
| Impersonating
| Notable Cyber Attacks During COVID-19
COVID-19 in Enterprises’ Eye
How enterprises and organizations are looking at the situation?
| How Enterprises Looking At COVID-19
• Ensure remote access to all existing work force
• Issue new gadgets and devices for supporting remote work
• Ensure the security and compliance of the newly added devices
• Ensure to address the newly shaped cyber security landscape
• Manage and orchestrate the newly increased remote work load
• Increase the capacity for self-service
• Enable more abilities in sales, service and delivery through digital
• Enable remote experiences with a personal touch
• Embrace opportunities to adapt products or capacity for current
demand
• Redefine employability and work culture
• Accelerate the transformation areas and dispersed work
• Bring new channels, supply chains - make them more resilient
• Achieve the ability to upscale and downscale operations
• Redefine the security and policies compliance posture
Expanding IT
Workplace and Access
New Methods
Address Market
Demands
Future Goals
Vital Transformations
Every industry is economically hurting, it’s time for technology to offer an extra mile.
| COVID-19, Ensuring Business Continuity
Enable Remote
Working1
Open More Digital
Channels2
Establish a Single
Source of Truth3
Alternate Supply
Chains4
Enable Business
Continuity Plans 1
Run Disaster
Recovery Plans 2
Activate Risk
Mitigation Plans 3
Aggressive Cloud
Strategy 4
Training,
Enablement5 VPN for All 5
| Key Focus | Key Strategy
| COVID-19, How to Secure
Harness the Cloud’s
Scalability and Cost-
Effectiveness
Gain the highest Level of
Security regardless of Where
Employees Are Located
Rely on Simple Security
Architecture That Delivers
Comprehensive Visibility
Ensure Proper Endpoint
Protection, Delivered as a
Service
Plan for BYOD (bring your
own device) devices
Sensitive data may be
accessed through unsafe
Wi-Fi networks
Cybersecurity hygiene and
visibility will be critical
Continued education is
crucial, as coronavirus-
themed scams escalate
4
Have a cybersecurity
policy that includes
remote working
Crisis management and
incident response plans need
to be executable by a remote
workforce
Future Areas of Cyber Security
What are the major areas that the cyber security should address next?
| The Future
Cyber Security Must Address
Highly advanced
connectivity
Shifting client
loads to cloud
Emerge new
business use cases
Obsolete
physical office
Connected and
smart society
Redefine
employability
Next generation cyber security,
AI-ML defense and analysis.
Reducing Gaps
Economy and Tech1
New Tech
Alliances for Good4
Investing in Social,
Digital Innovations3
Internet for All2
| Global Strategies
| COVID-19, An Accelerator
Digital Platforms
and AI, ML
Smart Cities
and Parks
Connected
Healthcare
Online
Education
Remote Office,
Virtual Office
5G Industry
Applications
Unmanned
Commerce
Fresh food
ecommerce
Supply chain
advancement
Advanced
Robots
The COVID-19 situation would accelerate research and wide adoption in below areas.
Discussions
Looking at it through different perspectives.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain SecurityICSA, LLC
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017R-Style Lab
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_doolyzdooly
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UKNapier University
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 

Was ist angesagt? (20)

cyber security
cyber securitycyber security
cyber security
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 

Ähnlich wie Covid 19, How A Pandemic Situation Shapes Cyber Threats

Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19Emile Sayegh
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 

Ähnlich wie Covid 19, How A Pandemic Situation Shapes Cyber Threats (20)

Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 

Kürzlich hochgeladen

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 

Kürzlich hochgeladen (20)

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 

Covid 19, How A Pandemic Situation Shapes Cyber Threats

  • 1. COVID-19, Evolving Cyber Threats How this evolving event shapes the cyber security and threat landscapes Monday, 11th April 2020. Arun Kannoth Senior Presales, Solution Architect – Technology & Platforms LinkedIn | arunkan@outlook.com | +974 3001 8009 | Presented By
  • 2. | Agenda • COVID-19, Situation at a Glance • Some Cyber Security FAQs During COVID-19 • Cyber Attacks – Evolving Causes • Hacker’s View on COVID-19 • Cyber Attacks During COVID-19 • COVID-19 in Enterprises’ Eye • Future Cyber Security Coverage • Discussions
  • 3. Covid-19, Situation at a Glance Where are we heading to?
  • 4. | COVID-19, Recent History of Pandemics Pandemic - Today and a bit from history. COVID-19 As of Today, 11th April 2020 Recent History of Pandemics
  • 5. | COVID-19, Projected Global GDP Impacts “Global GDP 2020 could slide or fall sharply due to COVID-19 outbreak.” “Situation is very dynamic, an accurate prediction would be challenging.” As of 23rd March 2020
  • 6. | COVID-19, Projected Industry Impacts “Banking, Financial Services, Insurance and Public Sector are predicted to be more resilient.” “This is ‘as of now’, more impacts of pandemic is yet to come out.” As of 23rd March 2020
  • 7. Cyber Security FAQs, COVID-19 Significant questions for Cyber Security researchers.
  • 8. | Cyber Security FAQs During COVID-19 Would any human be able to even think of taking advantage of such a sad situation? Should the cyber security experts address a pandemic situation that comes very rarely? Are there any serious cyber security attacks taking place leveraging the COVID-19 panic? How is the present posture of organizations during COVID in a Cyber Security perspective? How the organizations are likely to handle the emerging COVID-19 situation? What are the future transformations areas for the Cyber Security Experts to consider? 1 2 3 4 5 6
  • 9. Cyber Attacks - Evolving Causes Why hackers are taking advantage of this alarming situation?
  • 10. | Cyber Attack Causes, Evolution When the humanity is fighting pandemic, some people are busy exploiting. Why? Experimental Individual Organized Business Political1 2 3 4 5 • Tweaking into computers • Destruction of data • Corrupt files • Stealing information • Stealing files • Gaining control over computers • Destroying websites • Monetize Data • Monetize Personal Details • Monetize Official Information • Target Enterprises • Form Hacking Groups • Contract Attacks and Monetize • Research AI and ML • Sponsored by Govt. • Highly organized • Targeting Economies • Targeting Researches • Weaponized AI and ML Early Developing Developed Advancing Advanced . . . . • Tweaking into computers • Destruction of data • Corrupt files • Stealing information • Stealing files • Gaining control over computers • Destroying websites
  • 11. Hackers’ View on COVID-19 How cyber criminals approaching a pandemic?
  • 12. | A Pandemic is a Perfect Time Shortage of hardware Shortage of security systems Shortage of human skills Pending, Delayed Project deliveries Increase of manipulated news Increased supply chain failures Increase of dissatisfied staff A pandemic brings a lot of panic and disruption. It’s a stress and vulnerability test for organizations. Shortage of budget
  • 13. Cyber Attacks During COVID-19 How cyber attackers have been exploiting the situation?
  • 14. Phishing Emails Malware Ransom ware DOS attacks Trojan | Hackers Capitalizing The COVID-19 Panic Spikes of cyber attacks are observed during early 2020 and still going on. Enterprises’ compromises due to sudden upscaling of devices and VPNs Leveraging the softened networks, their never-tested theoretical BC policies Policy compliance violations, outdated software in the end-user machines 3 4 5 Forced adoption of technology across comparatively less tech-savvy people2 Panic situation, The curious nature of the human psyche in times of uncertainty1
  • 15. | Expert Studies During COVID-19 Most frequently used methods for deployment of malware. Emails Bad domains, Web Links Malicious AttachmentsApps, Text Messages | Research By
  • 16. | Spikes in Domain Registrations There is a sudden increase in creating domains, luring users to COVID-19 topics. United Nations1 Banks, Insurance4 Health Organizations3 Governmental Agencies2 | Impersonating
  • 17. | Notable Cyber Attacks During COVID-19
  • 18. COVID-19 in Enterprises’ Eye How enterprises and organizations are looking at the situation?
  • 19. | How Enterprises Looking At COVID-19 • Ensure remote access to all existing work force • Issue new gadgets and devices for supporting remote work • Ensure the security and compliance of the newly added devices • Ensure to address the newly shaped cyber security landscape • Manage and orchestrate the newly increased remote work load • Increase the capacity for self-service • Enable more abilities in sales, service and delivery through digital • Enable remote experiences with a personal touch • Embrace opportunities to adapt products or capacity for current demand • Redefine employability and work culture • Accelerate the transformation areas and dispersed work • Bring new channels, supply chains - make them more resilient • Achieve the ability to upscale and downscale operations • Redefine the security and policies compliance posture Expanding IT Workplace and Access New Methods Address Market Demands Future Goals Vital Transformations Every industry is economically hurting, it’s time for technology to offer an extra mile.
  • 20. | COVID-19, Ensuring Business Continuity Enable Remote Working1 Open More Digital Channels2 Establish a Single Source of Truth3 Alternate Supply Chains4 Enable Business Continuity Plans 1 Run Disaster Recovery Plans 2 Activate Risk Mitigation Plans 3 Aggressive Cloud Strategy 4 Training, Enablement5 VPN for All 5 | Key Focus | Key Strategy
  • 21. | COVID-19, How to Secure Harness the Cloud’s Scalability and Cost- Effectiveness Gain the highest Level of Security regardless of Where Employees Are Located Rely on Simple Security Architecture That Delivers Comprehensive Visibility Ensure Proper Endpoint Protection, Delivered as a Service Plan for BYOD (bring your own device) devices Sensitive data may be accessed through unsafe Wi-Fi networks Cybersecurity hygiene and visibility will be critical Continued education is crucial, as coronavirus- themed scams escalate 4 Have a cybersecurity policy that includes remote working Crisis management and incident response plans need to be executable by a remote workforce
  • 22. Future Areas of Cyber Security What are the major areas that the cyber security should address next?
  • 23. | The Future Cyber Security Must Address Highly advanced connectivity Shifting client loads to cloud Emerge new business use cases Obsolete physical office Connected and smart society Redefine employability Next generation cyber security, AI-ML defense and analysis. Reducing Gaps Economy and Tech1 New Tech Alliances for Good4 Investing in Social, Digital Innovations3 Internet for All2 | Global Strategies
  • 24. | COVID-19, An Accelerator Digital Platforms and AI, ML Smart Cities and Parks Connected Healthcare Online Education Remote Office, Virtual Office 5G Industry Applications Unmanned Commerce Fresh food ecommerce Supply chain advancement Advanced Robots The COVID-19 situation would accelerate research and wide adoption in below areas.
  • 25. Discussions Looking at it through different perspectives.