SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
2020: The Future
of Cybersecurity
in The Next
Decade
www.gpetrium.com
As Weak as its Weakest Links:
The Internet of Things
“The Internet of Things (IoT)
will continue to evolve and
create complex ecosystems
that are challenging from a
cybersecurity standpoint, as
the weakest links and new
unearthed vulnerabilities will
prove to be a continuous
threat to the IoT
environment”.
Further concerns:
- Liability re. obsolete
infrastructure?
- Liability re. malfunction
because of integrated
environment?
Guillherme Peterson,
GPetrium
As Weak as its Weakest Links:
Company Resources
“It will no longer be enough to
not be on the list of companies
that have faced a cybersecurity
breach that year, as investors
and analysts will begin pricing
cybersecurity risk into the
market.”
“To decrease cybersecurity
risks, companies will need to
embark in a cultural and
strategic transformation to
drive measurable
cybersecurity improvements”.
Cybersecurity and Individuals:
Comfort Technologies
“Executives will need to balance potential reputational
damage followed by a security breach with customer
demand for such products and proactive spending on
R&D to make such products safer.”
Brenda Gonzales, GPetrium
Cybersecurity and Individuals:
“The private sector will continue
to realize that they are not able
to fight certain types of cyber
threats alone. This will lead to a
partial shift in the mindset of
certain organizations, leading to
increased cooperation, albeit at
an arm’s length, with the public
sector.” Guillherme Peterson,
GPetrium
Public & Private Connections
Cybersecurity and Individuals:
“Cybersecurity thefts will propel the
creation of new business
adversaries causing drastic impacts
to the competitiveness. Major
business losses will follow, leading
to some business failure and
workforce displacement”.
Workforce Displacement
Brenda Gonzales,
GPetrium
Cybersecurity and Government:
Social Credits
“The interest in creating an
environment with stronger
data privacy will grow in
some countries, but it will be
hampered by the global trend
on social credit and its cost-
benefit analysis”.
Guillherme Peterson,
GPetrium
Cybersecurity and Government:
Regulatory Compliance
“AI and Machine
Learning cyber
security solutions will
go head-to-head
against governmental
regulations,
increasing regulatory
compliance scrutiny
at all organizational
sizes.” Brenda Gonzales,
GPetrium
Cybersecurity and Government:
National Security
“Expect the infiltration of
adversaries into public and
private institutions to
continue. A combination of
data breach, social
engineering, blackmailing and
perceived socio and economic
movements in society will be
used as tools.” Guillherme Peterson,
GPetrium
Cybersecurity and Individuals:
“The actions of society coupled with
governmental reinforcement of its
beliefs will be a major driver as to
whether private organizations will
hide a cyber breach, increase/
decrease cybersecurity budget and
work with peers to decrease
potential risks.”
Political Stability
Brenda Gonzales,
GPetrium
Cybersecurity and Businesses:
Organizational Reputation
“Cybersecurity breaches will
continue to stain the
reputation of organizations
around the world. According to
Comparitech, publicly traded
companies that have been
through a cyber breach have
on average underperformed in
the NASDAQ.” Guillherme Peterson,
GPetrium
Cybersecurity and Infrastructure:
5G’n Their Way Out
“5G will allow for increased
connectivity, larger numbers of devices,
more capable IoT and more. This will
power a boom for technological
innovation, however, in cybersecurity
terms, all the items listed above are
simply an exponential increase in threat
vectors raising the alarms in
cybersecurity departments.”
Guilherme Peterson,
GPetrium
Cybersecurity and Infrastructure:
Explainability
“A lack of AI and Machine
learning explainability towards
cybersecurity processes and
decisions will raise red flags at
all levels of society. Demand
for increased transparency
over its actions and decisions
will affect future software
development.” Brenda Gonzales,
GPetrium
Cybersecurity and Infrastructure:
Quantum Leap
“Although, without a doubt there
will continue to be challenges to
build a fully functioning quantum
computing apparatus, one thing
is clear: when fully functional,
quantum computing will have a
profound change in the very
fabric of technology and
computing.” Brenda Gonzales,
GPetrium
Cybercrime:
Cerberus of Data Leakage
“For every breach, the
potential for damage by
cybercriminals compounds.”
“Interference in the 2016
United States election will
prove to have been just the
prototype to much larger scale
interferences in the public and
private sectors.”
Guilherme Peterson,
GPetrium
Cybercrime:
The Rise of Cyber Militias
Cyber militias, a group who is
willing and able to conduct
cyber-attacks for the benefit or
interest of a larger organization,
will gain prominence and
continue to grow at a fast pace,
spreading to a larger portion of
the cyber environment.
Guillherme Peterson,
GPetrium
Cybercrime:
Defensive Attacks
“More actors both in the
private and public sector will
look for new, innovative ways
to use an attack to their assets
as an opportunity to infiltrate
the attacker.” Brenda Gonzales,
GPetrium
Cybercrime:
Advance Phishing
“Machine learning, AI and its
clusters will be essential to the
advancement of cybersecurity
firewalls and… cyber attacks.”
Guilherme Peterson,
GPetrium
Cybercrime:
Bug Hunters Become Hunted
“Sophisticated and well
financed threat actors will
advance their attacks on bug
hunting prize providers and
bug hunters to gain insight on
the most prolific bug hunters.”
Brenda Gonzales,
GPetrium
Cybercrime:
Oil Leak or Cloud Leak?
“There will be a heightened interest
for sophisticated actors to infiltrate
cloud providers and its suppliers to
gain direct access to data. Issues
with improper installation and
management of cloud services will
continue to be a major
cybersecurity challenge to many
cloud users.”
Guilherme Peterson,
GPetrium
Cybercrime:
Physical Safety
“A single or a few major
incidents associated with data
breach and advanced malicious
attacks with clear physical
implications will be a catalyst
that pushes certain
governments towards policies
that are considered to be
unacceptable in today’s
environment.”Brenda Gonzales,
GPetrium
Cybercrime:
Bio-Cyberhacking
“As individuals begin using technology in
their bodies for treatment, monitoring of
diseases, enhancements and more,
concerns over a malicious actor’s ability
to infiltrate such technology and lead to
physical harm will increase
exponentially.” Guilherme Peterson,
GPetrium
Cybercrime:
Deepfake and Cybersecurity
“The evolution of deepfake and its
derivatives will continue and, with that, it
will be used for new, more advanced
malicious attacks. Deepfake will likely be
used as a way to extort and blackmail
individuals, families and organizations.”
Brenda Gonzales,
GPetrium
Authors
Brenda Gonzales Guilherme Peterson
Terms of Use
In no way shall GPetrium be liable to you or any involved parties, for any damage or cost due
directly, indirectly, incidental or consequential led by the use or inability to use the tools or solutions. The
individual or organization using the tools or solutions are to take ownership of all risks and responsibilities
associated with the tools or solutions.
The documents, text, tools, insights, solutions, and other articles (the “Documents”) created by
GPetrium.com are considered copyrighted works under Canadian and other foreign copyright laws and
are owned by GPetrium. For a full bibliography of all images used in this document or any other request,
please contact the author(s).
Due to the sensitive nature of the topic, examples have been limited to highly publicized stories.
For those interested in enhancing their cybersecurity capabilities and overall digital strategy, contact the
authors.
GPetrium’s publication do not necessarily represent the views and opinions of its clients.
www.gpetrium.com

Weitere ähnliche Inhalte

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 

Empfohlen

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Empfohlen (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

2020: The Future of Cybersecurity in The Next Decade

  • 1. 2020: The Future of Cybersecurity in The Next Decade www.gpetrium.com
  • 2. As Weak as its Weakest Links: The Internet of Things “The Internet of Things (IoT) will continue to evolve and create complex ecosystems that are challenging from a cybersecurity standpoint, as the weakest links and new unearthed vulnerabilities will prove to be a continuous threat to the IoT environment”. Further concerns: - Liability re. obsolete infrastructure? - Liability re. malfunction because of integrated environment? Guillherme Peterson, GPetrium
  • 3. As Weak as its Weakest Links: Company Resources “It will no longer be enough to not be on the list of companies that have faced a cybersecurity breach that year, as investors and analysts will begin pricing cybersecurity risk into the market.” “To decrease cybersecurity risks, companies will need to embark in a cultural and strategic transformation to drive measurable cybersecurity improvements”.
  • 4. Cybersecurity and Individuals: Comfort Technologies “Executives will need to balance potential reputational damage followed by a security breach with customer demand for such products and proactive spending on R&D to make such products safer.” Brenda Gonzales, GPetrium
  • 5. Cybersecurity and Individuals: “The private sector will continue to realize that they are not able to fight certain types of cyber threats alone. This will lead to a partial shift in the mindset of certain organizations, leading to increased cooperation, albeit at an arm’s length, with the public sector.” Guillherme Peterson, GPetrium Public & Private Connections
  • 6. Cybersecurity and Individuals: “Cybersecurity thefts will propel the creation of new business adversaries causing drastic impacts to the competitiveness. Major business losses will follow, leading to some business failure and workforce displacement”. Workforce Displacement Brenda Gonzales, GPetrium
  • 7. Cybersecurity and Government: Social Credits “The interest in creating an environment with stronger data privacy will grow in some countries, but it will be hampered by the global trend on social credit and its cost- benefit analysis”. Guillherme Peterson, GPetrium
  • 8. Cybersecurity and Government: Regulatory Compliance “AI and Machine Learning cyber security solutions will go head-to-head against governmental regulations, increasing regulatory compliance scrutiny at all organizational sizes.” Brenda Gonzales, GPetrium
  • 9. Cybersecurity and Government: National Security “Expect the infiltration of adversaries into public and private institutions to continue. A combination of data breach, social engineering, blackmailing and perceived socio and economic movements in society will be used as tools.” Guillherme Peterson, GPetrium
  • 10. Cybersecurity and Individuals: “The actions of society coupled with governmental reinforcement of its beliefs will be a major driver as to whether private organizations will hide a cyber breach, increase/ decrease cybersecurity budget and work with peers to decrease potential risks.” Political Stability Brenda Gonzales, GPetrium
  • 11. Cybersecurity and Businesses: Organizational Reputation “Cybersecurity breaches will continue to stain the reputation of organizations around the world. According to Comparitech, publicly traded companies that have been through a cyber breach have on average underperformed in the NASDAQ.” Guillherme Peterson, GPetrium
  • 12. Cybersecurity and Infrastructure: 5G’n Their Way Out “5G will allow for increased connectivity, larger numbers of devices, more capable IoT and more. This will power a boom for technological innovation, however, in cybersecurity terms, all the items listed above are simply an exponential increase in threat vectors raising the alarms in cybersecurity departments.” Guilherme Peterson, GPetrium
  • 13. Cybersecurity and Infrastructure: Explainability “A lack of AI and Machine learning explainability towards cybersecurity processes and decisions will raise red flags at all levels of society. Demand for increased transparency over its actions and decisions will affect future software development.” Brenda Gonzales, GPetrium
  • 14. Cybersecurity and Infrastructure: Quantum Leap “Although, without a doubt there will continue to be challenges to build a fully functioning quantum computing apparatus, one thing is clear: when fully functional, quantum computing will have a profound change in the very fabric of technology and computing.” Brenda Gonzales, GPetrium
  • 15. Cybercrime: Cerberus of Data Leakage “For every breach, the potential for damage by cybercriminals compounds.” “Interference in the 2016 United States election will prove to have been just the prototype to much larger scale interferences in the public and private sectors.” Guilherme Peterson, GPetrium
  • 16. Cybercrime: The Rise of Cyber Militias Cyber militias, a group who is willing and able to conduct cyber-attacks for the benefit or interest of a larger organization, will gain prominence and continue to grow at a fast pace, spreading to a larger portion of the cyber environment. Guillherme Peterson, GPetrium
  • 17. Cybercrime: Defensive Attacks “More actors both in the private and public sector will look for new, innovative ways to use an attack to their assets as an opportunity to infiltrate the attacker.” Brenda Gonzales, GPetrium
  • 18. Cybercrime: Advance Phishing “Machine learning, AI and its clusters will be essential to the advancement of cybersecurity firewalls and… cyber attacks.” Guilherme Peterson, GPetrium
  • 19. Cybercrime: Bug Hunters Become Hunted “Sophisticated and well financed threat actors will advance their attacks on bug hunting prize providers and bug hunters to gain insight on the most prolific bug hunters.” Brenda Gonzales, GPetrium
  • 20. Cybercrime: Oil Leak or Cloud Leak? “There will be a heightened interest for sophisticated actors to infiltrate cloud providers and its suppliers to gain direct access to data. Issues with improper installation and management of cloud services will continue to be a major cybersecurity challenge to many cloud users.” Guilherme Peterson, GPetrium
  • 21. Cybercrime: Physical Safety “A single or a few major incidents associated with data breach and advanced malicious attacks with clear physical implications will be a catalyst that pushes certain governments towards policies that are considered to be unacceptable in today’s environment.”Brenda Gonzales, GPetrium
  • 22. Cybercrime: Bio-Cyberhacking “As individuals begin using technology in their bodies for treatment, monitoring of diseases, enhancements and more, concerns over a malicious actor’s ability to infiltrate such technology and lead to physical harm will increase exponentially.” Guilherme Peterson, GPetrium
  • 23. Cybercrime: Deepfake and Cybersecurity “The evolution of deepfake and its derivatives will continue and, with that, it will be used for new, more advanced malicious attacks. Deepfake will likely be used as a way to extort and blackmail individuals, families and organizations.” Brenda Gonzales, GPetrium
  • 25. Terms of Use In no way shall GPetrium be liable to you or any involved parties, for any damage or cost due directly, indirectly, incidental or consequential led by the use or inability to use the tools or solutions. The individual or organization using the tools or solutions are to take ownership of all risks and responsibilities associated with the tools or solutions. The documents, text, tools, insights, solutions, and other articles (the “Documents”) created by GPetrium.com are considered copyrighted works under Canadian and other foreign copyright laws and are owned by GPetrium. For a full bibliography of all images used in this document or any other request, please contact the author(s). Due to the sensitive nature of the topic, examples have been limited to highly publicized stories. For those interested in enhancing their cybersecurity capabilities and overall digital strategy, contact the authors. GPetrium’s publication do not necessarily represent the views and opinions of its clients. www.gpetrium.com