SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
INFOSEC PROS SHARE THEIR MOST MEMORABLE MOMENTS
2 18
A Look Back At
“IN JANUARY, IT WAS REVEALED THAT RESEARCHERS
COULD TRACE THE GEOGRAPHIC LOCATIONS OF U.S.
MILITARY PERSONNEL VIA DATA FROM THEIR WEARABLE
FITNESS DEVICES. IN JULY, RESEARCHERS TRACED THE
REAL-TIME LOCATIONS OF INTELLIGENCE PERSONNEL
AROUND THE GLOBE … AND ALSO EXPOSED [THEIR] NAMES.
…PERHAPS, MORE THAN EVER, THESE EVENTS MADE IT
CLEAR THAT IOT PRIVACY BREACHES CAN HAVE A
DIRECT IMPACT ON NATIONAL SECURITY.”
-Justin Sherman
Cybersecurity Fellow
“ENORMOUS PROGRESS WAS
MADE TOWARDS GETTING
MULTI-FACTOR AUTHENTICATION
THE RECOGNITION IT DESERVES.
THEN, IT WAS DASHED TO
PIECES BY THE RECENT AZURE
2FA FAILURES… I WILL
PROBABLY SPEND 2019 TRYING
TO RECONCILE THIS. I HOPE
THAT THE 2FA ENGINEERS CAN
MAKE THIS FAILURE A DISTANT
MEMORY.” -Bob Covello
IT SECURITY DIRECTOR
“FROM POORLY CONFIGURED APPS, TO
AWARD PORTALS AND BREACHES OF
INFRASTRUCTURE, THE [airline] INDUSTRY
HAS BEEN GIVEN A WAKE-UP CALL.
DATA SECURITY IS A RESPONSIBILITY–
AS IMPORTANT AS MAINTAINING AN
AIRCRAFT IS MAINTAINING THE PRIVACY
OF THE PASSENGER.”
-Christopher Burgess
Cybersecurity ADVISOR
“UNLESS YOU ARE OF A PARTICULARLY GEEKY
PERSUASION, MOST FIRMWARE UPDATES LIKELY
PASS YOU BY. SPECTRE SHOWED THE WORLD THAT
HARDWARE-RELATED EXPLOITS WERE REAL, AND IT
HAD THE POTENTIAL TO AFFECT US ALL. IT ALSO
HIGHLIGHTED THE CHALLENGE OF PATCHING
HARDWARE AND ITS IMPACT.”
-Chris Hudson
PROFESSIONAL SERVICES
CONSULANT
“THE SINGLE, MOST MEMORABLE EVENT WAS THE
MASSIVE FERVOR OVER MELTDOWN AND SPECTRE…
TO ME, IT HIGHLIGHTS A CONSISTENT LACK OF
ALIGNMENT IN OUR INDUSTRY BETWEEN ACTUAL
THREATS AND WHAT WE PERCEIVE TO BE THREATS…
OUR INDUSTRY’S FOCUS IS OFTEN MORE CAPTURED
BY THE OUTPUT OF VENDORS, EVENTS AND
RESEARCHERS THAN BY THE ACTIONS OF CRIMINALS
AND VICTIM EXPERIENCES.”
-aDRIAN SANABRIA
VP, STRATEGY & PRODUCT MARKETING
“WE HAVE SEEN A REAL SHIFT TOWARDS OUTRAGE AND
TAKING ACTION TO TACKLE UNETHICAL USE OF DATA AND
TECHNOLOGY AMONG TECH LEADERS, THE DEVELOPER
COMMUNITY AND A MYRIAD OF ASSOCIATED GROUPS,
INCLUDING CONSUMERS. THAT CUMULATIVE WAVE
[AGAINST] INFRINGEMENT OF HUMAN RIGHTS
HAS DONE MORE TO DRIVE ATTENTION
TO SECURITY AND DATA PROTECTION
THAN ANYTHING BEFORE.”
-Sarah Clarke
Security grc specialist
“SAMSAM RANSOMWARE FIRST EMERGED IN 2016 BUT
IN 2018, IT’S BEEN MORE DESTRUCTIVE THAN EVER. THE
CITY OF ATLANTA AND MANY HOSPITALS AROUND THE
WORLD HAVE BEEN AMONGST ITS VICTIMS. NO
DECRYPTION TOOL HAS BEEN DEVELOPED FOR SAMSAM-
ENCRYPTED FILES AS OF YET… TO TOP THINGS OFF,
SAMSAM HAS BEEN FOUND FOR SALE ON THE DARK WEB
FOR ABOUT $750.”
-kim crawley
Cybersecurity writer
“FOR SO LONG, THE CONVENIENCE OF
SMARTPHONES, SOCIAL MEDIA, DIGITAL
ACCESS, ETC. HAS ECLIPSED CONCERNS
ABOUT PERSONAL PRIVACY AND
CORPORATE MARKETING.
COMBINE THE RECENT CONTROVERSIES
AROUND FAKE NEWS, POLITICAL
ADVERTISING AND CAMPAIGNING WITH
THE SEPT. FACEBOOK BREACH, AND WE
MAY HAVE REACH AN INFLECTION POINT.”
-MARIBETH PUSIESKI
ACCOUNT EXECUTIVE
“BEING CANADIAN IN A WORLD WHERE SECURITY
NEWS TENDS TO BE US-CENTRIC, I WAS EXCITED TO
SEE OUR MANDATORY DATA BREACH NOTIFICATION
LAW TAKE EFFECT. IT ISN’T PERFECT AS IT ONLY
MAKES NOTIFICATION NECESSARY WHEN THERE’S A
REAL RISK OF SIGNIFICANT HARM… THERE’S STILL
A LOT THAT CANADA HAS TO DO REGARDING
CYBERSECURITY BUT, FOR NOW, IT’S A START.”
-TYLER REGULY
MANAGER, SOFTWARE DEVELOPMENT
FOR MORE INFOSEC INSIGHTS,
VISIT TRIPWIRE.COM/BLOG
WHAT’S YOUR MOST
MEMORABLE 2018 MOMENT?
TWEET US @TRIPWIREINC

Weitere ähnliche Inhalte

Ähnlich wie A Look Back at 2018: The Most Memorable Cyber Moments

Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
Jeremiah Grossman
 
Reader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxReader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docx
niraj57
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Brent Guglielmino
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
Tughral Yamin
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
q3XKFc5XR
 
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
UNITEC
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
Ray Brannon
 

Ähnlich wie A Look Back at 2018: The Most Memorable Cyber Moments (20)

Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
 
Smart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way ForwardSmart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way Forward
 
GARRIE.REEVES.37.5
GARRIE.REEVES.37.5GARRIE.REEVES.37.5
GARRIE.REEVES.37.5
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
Reader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxReader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docx
 
Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
 
Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013
 

Mehr von Tripwire

Mehr von Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

A Look Back at 2018: The Most Memorable Cyber Moments

  • 1. INFOSEC PROS SHARE THEIR MOST MEMORABLE MOMENTS 2 18 A Look Back At
  • 2. “IN JANUARY, IT WAS REVEALED THAT RESEARCHERS COULD TRACE THE GEOGRAPHIC LOCATIONS OF U.S. MILITARY PERSONNEL VIA DATA FROM THEIR WEARABLE FITNESS DEVICES. IN JULY, RESEARCHERS TRACED THE REAL-TIME LOCATIONS OF INTELLIGENCE PERSONNEL AROUND THE GLOBE … AND ALSO EXPOSED [THEIR] NAMES. …PERHAPS, MORE THAN EVER, THESE EVENTS MADE IT CLEAR THAT IOT PRIVACY BREACHES CAN HAVE A DIRECT IMPACT ON NATIONAL SECURITY.” -Justin Sherman Cybersecurity Fellow
  • 3. “ENORMOUS PROGRESS WAS MADE TOWARDS GETTING MULTI-FACTOR AUTHENTICATION THE RECOGNITION IT DESERVES. THEN, IT WAS DASHED TO PIECES BY THE RECENT AZURE 2FA FAILURES… I WILL PROBABLY SPEND 2019 TRYING TO RECONCILE THIS. I HOPE THAT THE 2FA ENGINEERS CAN MAKE THIS FAILURE A DISTANT MEMORY.” -Bob Covello IT SECURITY DIRECTOR
  • 4. “FROM POORLY CONFIGURED APPS, TO AWARD PORTALS AND BREACHES OF INFRASTRUCTURE, THE [airline] INDUSTRY HAS BEEN GIVEN A WAKE-UP CALL. DATA SECURITY IS A RESPONSIBILITY– AS IMPORTANT AS MAINTAINING AN AIRCRAFT IS MAINTAINING THE PRIVACY OF THE PASSENGER.” -Christopher Burgess Cybersecurity ADVISOR
  • 5. “UNLESS YOU ARE OF A PARTICULARLY GEEKY PERSUASION, MOST FIRMWARE UPDATES LIKELY PASS YOU BY. SPECTRE SHOWED THE WORLD THAT HARDWARE-RELATED EXPLOITS WERE REAL, AND IT HAD THE POTENTIAL TO AFFECT US ALL. IT ALSO HIGHLIGHTED THE CHALLENGE OF PATCHING HARDWARE AND ITS IMPACT.” -Chris Hudson PROFESSIONAL SERVICES CONSULANT
  • 6. “THE SINGLE, MOST MEMORABLE EVENT WAS THE MASSIVE FERVOR OVER MELTDOWN AND SPECTRE… TO ME, IT HIGHLIGHTS A CONSISTENT LACK OF ALIGNMENT IN OUR INDUSTRY BETWEEN ACTUAL THREATS AND WHAT WE PERCEIVE TO BE THREATS… OUR INDUSTRY’S FOCUS IS OFTEN MORE CAPTURED BY THE OUTPUT OF VENDORS, EVENTS AND RESEARCHERS THAN BY THE ACTIONS OF CRIMINALS AND VICTIM EXPERIENCES.” -aDRIAN SANABRIA VP, STRATEGY & PRODUCT MARKETING
  • 7. “WE HAVE SEEN A REAL SHIFT TOWARDS OUTRAGE AND TAKING ACTION TO TACKLE UNETHICAL USE OF DATA AND TECHNOLOGY AMONG TECH LEADERS, THE DEVELOPER COMMUNITY AND A MYRIAD OF ASSOCIATED GROUPS, INCLUDING CONSUMERS. THAT CUMULATIVE WAVE [AGAINST] INFRINGEMENT OF HUMAN RIGHTS HAS DONE MORE TO DRIVE ATTENTION TO SECURITY AND DATA PROTECTION THAN ANYTHING BEFORE.” -Sarah Clarke Security grc specialist
  • 8. “SAMSAM RANSOMWARE FIRST EMERGED IN 2016 BUT IN 2018, IT’S BEEN MORE DESTRUCTIVE THAN EVER. THE CITY OF ATLANTA AND MANY HOSPITALS AROUND THE WORLD HAVE BEEN AMONGST ITS VICTIMS. NO DECRYPTION TOOL HAS BEEN DEVELOPED FOR SAMSAM- ENCRYPTED FILES AS OF YET… TO TOP THINGS OFF, SAMSAM HAS BEEN FOUND FOR SALE ON THE DARK WEB FOR ABOUT $750.” -kim crawley Cybersecurity writer
  • 9. “FOR SO LONG, THE CONVENIENCE OF SMARTPHONES, SOCIAL MEDIA, DIGITAL ACCESS, ETC. HAS ECLIPSED CONCERNS ABOUT PERSONAL PRIVACY AND CORPORATE MARKETING. COMBINE THE RECENT CONTROVERSIES AROUND FAKE NEWS, POLITICAL ADVERTISING AND CAMPAIGNING WITH THE SEPT. FACEBOOK BREACH, AND WE MAY HAVE REACH AN INFLECTION POINT.” -MARIBETH PUSIESKI ACCOUNT EXECUTIVE
  • 10. “BEING CANADIAN IN A WORLD WHERE SECURITY NEWS TENDS TO BE US-CENTRIC, I WAS EXCITED TO SEE OUR MANDATORY DATA BREACH NOTIFICATION LAW TAKE EFFECT. IT ISN’T PERFECT AS IT ONLY MAKES NOTIFICATION NECESSARY WHEN THERE’S A REAL RISK OF SIGNIFICANT HARM… THERE’S STILL A LOT THAT CANADA HAS TO DO REGARDING CYBERSECURITY BUT, FOR NOW, IT’S A START.” -TYLER REGULY MANAGER, SOFTWARE DEVELOPMENT
  • 11. FOR MORE INFOSEC INSIGHTS, VISIT TRIPWIRE.COM/BLOG WHAT’S YOUR MOST MEMORABLE 2018 MOMENT? TWEET US @TRIPWIREINC