SlideShare ist ein Scribd-Unternehmen logo
1 von 20
CYBER ATTACKS & IT SECURITY IN 2025
The expert survey concerning future trends
and challenges in IT security
IN 2025& IT SECURITYCYBER
ATTACKS
» With which type of cyber attacks will we be
confronted with in 2025?
» Which functionalities are IT security technologies
currently lacking and what do they need to offer in
2025?
» Which are the biggest challenges for IT security
today and which will there be in 2025?
» In which areas of IT security do companies need to
invest in order to be viable in 2025?
HOW SECURE IS
TOMORROW‘S IT?
Qualitative study / Questionnaire,
typological analysis
Expert answers given by
» IT security officers of medium-sized and large
enterprises
» Highly specialized analysts that monitor IT security of
large corporations
» Researchers that deal with IT security research for more
than 5 years
» Programming experts with specialization on IT risk
analyses software
ABOUT THE EXPERTS
AND THE METHOD
EXPERTS ABOUT
CYBER ATTACKS
IN 2025
DANGER NO. 1
» The future starts now:
» The number of attacks with regards
to the Internet of Things will explode
DANGER NO. 1
DANGER NO. 2
DANGER NO. 2
» Malware of the next generation
will be even more dangerous
(Original quotes)
“Integrated backdoors”
“Attacks with undreamed
precision, range and speed”
DANGER NO. 3
DANGER NO. 3
» The user as starting point for attacks,
especially for social engineering attacks
“Users are
the weakest link” “Personal data
is stolen”
“Social engineering
is growing”
WHAT
IT SECURITY TECHNOLOGY
NEEDS TO
OFFERIN 2025
WHAT IT SECURITY TECHNOLOGY
NEEDS TO OFFER IN 2025
» Most important ability: artificial intelligence
for prompt reactions to attacks
» Major advances in automated attack
detection and reaction
» Urgently needed new authentication
methods
“Self defense of
systems”
“Intelligently automated
detection of targeted
attacks”
“The end of the
password generation”
EXPERTS ABOUT CHALLENGES
FOR IT SECURITY
» Users, their security
awareness and security
knowhow
» Today’s data mass and the
future data explosion
TODAY
TOMORRO
W
The lack of IT standards and
coordination between actors that
fight against cyber criminality
The fast technological
progress, above all the IoT
TOMORRO
W
TODAY
TODAY
AND
TOMORRO
W
THE RIGHT
RESOURCE ALLOCATION
FOR A SECURE
CORPORATE IT IN 2025
RESOURCE
ALLOCATION
THE RIGHT
FOR A SECURECORPORATE IT IN 2025
THE RIGHT
RESOURCE ALLOCATION
FOR A SECURE
CORPORATE IT IN 2025
» Increase awareness on all hierarchy levels
and train security professionals continuously
“Ignorance on CxO level”
“Staff in the security
stone age”
“2025 – possibly security middle ages reached”
» More attention to automatized analyses
of security relevant data in real time
THE RIGHT
RESOURCE ALLOCATION
FOR A SECURE
CORPORATE IT IN 2025
“Predict attacks“
“Analyses in real time”
“(Really) secure cloud solutions”
CONCLUSION
The framework factors that define the
future of IT security:
CONCLUSION
The framework factors that define the
future of IT security:
The user behavior
The advance of IT security at similar pace
as the technological progress
The development of cyber attacks in
comparison with the further development
of IT security technologies
123
IT IS ALL
ABOUT YOUR
IT SECURITY.
T.: +43 (1) 929 12 71-0
dialog@radarservices.com
www.radarservices.com
© 2016 RadarServices Smart IT-Security GmbH
CONTACT US:

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 

Andere mochten auch

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
Togis UAB Ltd
 
Dialysis Patient Demonstration Act
Dialysis Patient Demonstration ActDialysis Patient Demonstration Act
Dialysis Patient Demonstration Act
Kristy Lukaszewski
 

Andere mochten auch (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
Analyzing Bitcoin Security
Analyzing Bitcoin SecurityAnalyzing Bitcoin Security
Analyzing Bitcoin Security
 
Dialysis Patient Demonstration Act
Dialysis Patient Demonstration ActDialysis Patient Demonstration Act
Dialysis Patient Demonstration Act
 
10 tips on how to be a professional photographer
10 tips on how to be a professional photographer10 tips on how to be a professional photographer
10 tips on how to be a professional photographer
 
入試問題は最初の対話
入試問題は最初の対話入試問題は最初の対話
入試問題は最初の対話
 
Effective Report Writing
Effective Report WritingEffective Report Writing
Effective Report Writing
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 
Doing Business in the Middle East
Doing Business in the Middle EastDoing Business in the Middle East
Doing Business in the Middle East
 
антиплагиат)
антиплагиат)антиплагиат)
антиплагиат)
 
MITM : man in the middle attack
MITM : man in the middle attackMITM : man in the middle attack
MITM : man in the middle attack
 
E commerce Company ROI
E commerce Company ROIE commerce Company ROI
E commerce Company ROI
 
How to Build a Content Strategy to Maximize Results
How to Build a Content Strategy to Maximize ResultsHow to Build a Content Strategy to Maximize Results
How to Build a Content Strategy to Maximize Results
 
Developer in Test (SDET) - Job in London
Developer in Test (SDET) - Job in LondonDeveloper in Test (SDET) - Job in London
Developer in Test (SDET) - Job in London
 

Ähnlich wie Cyber attacks and IT security management in 2025

40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
TopCyberNewsMAGAZINE
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 

Ähnlich wie Cyber attacks and IT security management in 2025 (20)

40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptx
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Cyber attacks and IT security management in 2025

  • 1. CYBER ATTACKS & IT SECURITY IN 2025
  • 2. The expert survey concerning future trends and challenges in IT security IN 2025& IT SECURITYCYBER ATTACKS
  • 3. » With which type of cyber attacks will we be confronted with in 2025? » Which functionalities are IT security technologies currently lacking and what do they need to offer in 2025? » Which are the biggest challenges for IT security today and which will there be in 2025? » In which areas of IT security do companies need to invest in order to be viable in 2025? HOW SECURE IS TOMORROW‘S IT?
  • 4. Qualitative study / Questionnaire, typological analysis Expert answers given by » IT security officers of medium-sized and large enterprises » Highly specialized analysts that monitor IT security of large corporations » Researchers that deal with IT security research for more than 5 years » Programming experts with specialization on IT risk analyses software ABOUT THE EXPERTS AND THE METHOD
  • 7. » The future starts now: » The number of attacks with regards to the Internet of Things will explode DANGER NO. 1
  • 9. DANGER NO. 2 » Malware of the next generation will be even more dangerous (Original quotes) “Integrated backdoors” “Attacks with undreamed precision, range and speed”
  • 11. DANGER NO. 3 » The user as starting point for attacks, especially for social engineering attacks “Users are the weakest link” “Personal data is stolen” “Social engineering is growing”
  • 13. WHAT IT SECURITY TECHNOLOGY NEEDS TO OFFER IN 2025 » Most important ability: artificial intelligence for prompt reactions to attacks » Major advances in automated attack detection and reaction » Urgently needed new authentication methods “Self defense of systems” “Intelligently automated detection of targeted attacks” “The end of the password generation”
  • 14. EXPERTS ABOUT CHALLENGES FOR IT SECURITY » Users, their security awareness and security knowhow » Today’s data mass and the future data explosion TODAY TOMORRO W The lack of IT standards and coordination between actors that fight against cyber criminality The fast technological progress, above all the IoT TOMORRO W TODAY TODAY AND TOMORRO W
  • 15. THE RIGHT RESOURCE ALLOCATION FOR A SECURE CORPORATE IT IN 2025 RESOURCE ALLOCATION THE RIGHT FOR A SECURECORPORATE IT IN 2025
  • 16. THE RIGHT RESOURCE ALLOCATION FOR A SECURE CORPORATE IT IN 2025 » Increase awareness on all hierarchy levels and train security professionals continuously “Ignorance on CxO level” “Staff in the security stone age” “2025 – possibly security middle ages reached”
  • 17. » More attention to automatized analyses of security relevant data in real time THE RIGHT RESOURCE ALLOCATION FOR A SECURE CORPORATE IT IN 2025 “Predict attacks“ “Analyses in real time” “(Really) secure cloud solutions”
  • 18. CONCLUSION The framework factors that define the future of IT security:
  • 19. CONCLUSION The framework factors that define the future of IT security: The user behavior The advance of IT security at similar pace as the technological progress The development of cyber attacks in comparison with the further development of IT security technologies 123
  • 20. IT IS ALL ABOUT YOUR IT SECURITY. T.: +43 (1) 929 12 71-0 dialog@radarservices.com www.radarservices.com © 2016 RadarServices Smart IT-Security GmbH CONTACT US: