SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
A Bright Future in Cyber security
Olufemi VAUGHAN CISA, ITIL
ICSDL Instructor
July, 2015
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
 Technology connects and enriches the lives of
every person on earth
 Security is critical to protect computing
technology from threats which undermine the
health of the industry
DeAfrica
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
DeAfrica
 “...If security breaks down, technology breaks down”
Brian Krebs
Noted Cyber security Reporter
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Peering into the future of cyber
security
 Understand the value of security in technology and shifting trends
 Better insights to today’s challenges and prepare for tomorrows
dangers
 Identify opportunities and best practices for better security across the
industry
 Define what success looks like:
 How do we prepare?
 How do we achieve sustainable security?
 Can we maintain an optimal balance of risk?
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Chain Reactions Drive Cyber
security Evolution…
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Technology-Landscape
Environmental changes
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Technology-Landscape
Environmental changes
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Effects of Technology-
Landscape changes
• A growing target-rich environment of more users,
data, and devices
• Motivation for attacks rise as information and
systems increase in value
• New technology adoption, infrastructures, and
usages creates a larger attack surface
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Threat Evolution
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Threat Evolution
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Effects of the Threat
Evolution
•Attackers capabilities increases with
investments, experience, and professional threat
agents
•Successes boosts confidence, raises the lure for
more attacks and boldness to expand scope
•Defenders struggle with a growing attack
surface, challenging effectiveness models, lack of
talent, and insufficient resources
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Impacts and Effects
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Impacts and Effects
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
4 Levels of Cyber security Impacts
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Effects of Impacts
•Users are impacted more and more.
Awarenessincreases and security issues are
recognized as a serious problem
•Organizations feel the pain in losses, negative
press, interruption, leadership, & competitiveness
•Demands for more securely designed products,
trustworthy vendors, better user-behaviors,
advanced security systems, and more regulation
to protect assets, usability, privacy, and
availability
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Defenses Respond
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Defenses Respond
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
The Future of Securing Technology
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Good Practices will Emerge…
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Analysis Conclusion
 Verge of rapid changes, will get worse before
it gets better
 Threat landscape becomes more
professional, organized, and funded
 Technology ecosystem grows rapidly,
creating new attack surfaces
 Value of security rises in the eyes of the
public, government, and commercial sectors
 Attackers will outpace defenders in the short
term, until fundamental changes take place
 Defenses will evolve to be smarter, with
optimal and sustainable security as the goal
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Recommendations:
 Leadership is crucial. Take definitive steps to be ahead of the risk curve. Do
what is great, while it is small…
 Seek an optimal and sustainable level of security
 Stay aware of your threats, assets, controls, and exposures over time
 Get in front of technology adoption and leverage security to enable rather
than impede desired usages
 Treat security as a cycle. Prevention is important, but is never impervious.
Plan across the cycle, including feedback loops for continual improvement
 Leverage defensive advantages, experts, and continuously implement
industry best-known-methods
 Stay positive, keep learning, and collaborate across the community. We are
stronger together than individually
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
 3.6B people by 2020. Source:ITU International Telecommunications Union
 6.6B mobile cellular subscriptions in 2013. Source: WorldBank.org
 Growth of devices chart. Source: BI Intelligence
 50B ‘things’ connected by 2020. Source: Cisco
 35% will be M2M connections. Source: Cisco
 More Data growth estimate graphic Source: IDC
 13x increase of mobile data 2012-17 Source: Cisco
 3x data increase by 2018 Source: Cisco
 30GB per person/mo. (2x 2013) Source: Cisco
 18% CAGR of Business traffic Source: Cisco
 $14.4 trillion dollars by 2022Internet of Things value. Source: Cisco
 Theoretical network connections table. Source: Cisco
 4x DC traffic by 2018, 31% CAGR. Source: Cisco
 13,300 trillion connections by 2020. Source: Cisco
 70% of organizations claim they do not have enough IT security staff. Source: PonemonInstitute report: Understaffed and at Risk
 58% of senior staff positions and 36% of staff positions went unfilled in 2013. Source: PonemonInstitute report: Understaffed and at Risk
 15% of vulnerabilities exploited Source: University of Maryland
 Average Day in an Average Enterprise Stopwatch. Source: Check Point Security Report 2014
 New malware at 4 per second. Source: McAfee
 1M+ victims/day (12/second). Source: McAfee
 $3T impact to the tech market: Source: World 2014 World Economic Forum’s Risk and Responsibility in a HyperconnectedWorld
 20%-30% of IT budgets. Sources: McKinsey report (20-30%), Forrester 21%, SANS 11%-25%
 49%, 200M+ total malware samples 240 per minute, 4 per second Source: McAfee Threat Report Q1 2014
 50% Online adults victims of cybercrime or negative situations Source: Symantec
 93% Organizations suffering data loss: Source: UK Government BIS survey 2013
 $71B Worldwide IT security spending in 2014, 7.9% increase Source: Gartner
 97% Organizations compromised by attacker bypassing all defenses. Source: FireEyeand Mandiantreport Cybersecurity’s Maginot Line
 552M Total identities exposed in 2013, 493% increase Source: Symantec
 Data Breach bubble graph. Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Security Industry Data and Sources
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Questions?
For more information,
please visit
www.deafrica.org
or email
info@deafrica.org

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
Mr Nyak
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 

Was ist angesagt? (20)

Pace IT - Secure Mobile Devices
Pace IT - Secure Mobile DevicesPace IT - Secure Mobile Devices
Pace IT - Secure Mobile Devices
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
CERT Certification
CERT CertificationCERT Certification
CERT Certification
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Quantifying Cyber Risk
Quantifying Cyber Risk Quantifying Cyber Risk
Quantifying Cyber Risk
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 

Andere mochten auch

Resume 2015 linked in copy
Resume 2015 linked in copyResume 2015 linked in copy
Resume 2015 linked in copy
Brennen Chavez
 
Ppa con tic final belkis rodriguez
Ppa con tic   final belkis rodriguezPpa con tic   final belkis rodriguez
Ppa con tic final belkis rodriguez
diplomm
 
20120721_RxTstury05-LT
20120721_RxTstury05-LT20120721_RxTstury05-LT
20120721_RxTstury05-LT
Chiaki Nishi
 

Andere mochten auch (17)

Medicina Humana
Medicina Humana Medicina Humana
Medicina Humana
 
Flash comment: Estonia - December 9, 2011
Flash comment: Estonia - December 9, 2011Flash comment: Estonia - December 9, 2011
Flash comment: Estonia - December 9, 2011
 
Sílabo materia pedagogía patricio tobar
Sílabo materia pedagogía patricio tobarSílabo materia pedagogía patricio tobar
Sílabo materia pedagogía patricio tobar
 
The usefulness of the tools & strategies for planning and assesing learning.
The usefulness of the tools & strategies for planning and assesing learning.The usefulness of the tools & strategies for planning and assesing learning.
The usefulness of the tools & strategies for planning and assesing learning.
 
Resume 2015 linked in copy
Resume 2015 linked in copyResume 2015 linked in copy
Resume 2015 linked in copy
 
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrand
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrandHotel auvergne-puy-de-dome-vulcania-clermont-ferrand
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrand
 
Ppa con tic final belkis rodriguez
Ppa con tic   final belkis rodriguezPpa con tic   final belkis rodriguez
Ppa con tic final belkis rodriguez
 
20120721_RxTstury05-LT
20120721_RxTstury05-LT20120721_RxTstury05-LT
20120721_RxTstury05-LT
 
Se hacen tesis de diseño de imagen y estilo
Se hacen tesis de diseño de imagen y estilo Se hacen tesis de diseño de imagen y estilo
Se hacen tesis de diseño de imagen y estilo
 
20151024コクヨイベント
20151024コクヨイベント20151024コクヨイベント
20151024コクヨイベント
 
Curso para sentidos do cerebro
Curso para sentidos do cerebroCurso para sentidos do cerebro
Curso para sentidos do cerebro
 
高雄市製造業概況(傳統產業加值轉型推動計畫)
高雄市製造業概況(傳統產業加值轉型推動計畫)高雄市製造業概況(傳統產業加值轉型推動計畫)
高雄市製造業概況(傳統產業加值轉型推動計畫)
 
encuesta spss
encuesta spss encuesta spss
encuesta spss
 
Efficacy of RONOZYME® HiPhos in Turkey Poult Diets
Efficacy of RONOZYME® HiPhos in Turkey Poult DietsEfficacy of RONOZYME® HiPhos in Turkey Poult Diets
Efficacy of RONOZYME® HiPhos in Turkey Poult Diets
 
Seasons of the year
Seasons of the yearSeasons of the year
Seasons of the year
 
Organizadores generalidades sobre.teoria sdocx
Organizadores generalidades sobre.teoria sdocxOrganizadores generalidades sobre.teoria sdocx
Organizadores generalidades sobre.teoria sdocx
 
Aplicación de estrategias en el nivel inicial
Aplicación de estrategias en el nivel inicialAplicación de estrategias en el nivel inicial
Aplicación de estrategias en el nivel inicial
 

Ähnlich wie Bright future ahead in Cybersecurity

Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Moses Kemibaro
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
Alex Weishaupt
 

Ähnlich wie Bright future ahead in Cybersecurity (20)

Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
Cyber Security Courses in Kerala
Cyber Security Courses in KeralaCyber Security Courses in Kerala
Cyber Security Courses in Kerala
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 

Mehr von Vaughan Olufemi ACIB, AICEN, ANIM

Mehr von Vaughan Olufemi ACIB, AICEN, ANIM (6)

Retrieval and Workflows
Retrieval and WorkflowsRetrieval and Workflows
Retrieval and Workflows
 
Document Management System
Document Management SystemDocument Management System
Document Management System
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Careers in cyber security
Careers in cyber securityCareers in cyber security
Careers in cyber security
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Bright future ahead in Cybersecurity

  • 1. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM A Bright Future in Cyber security Olufemi VAUGHAN CISA, ITIL ICSDL Instructor July, 2015
  • 2. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM  Technology connects and enriches the lives of every person on earth  Security is critical to protect computing technology from threats which undermine the health of the industry DeAfrica
  • 3. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM DeAfrica  “...If security breaks down, technology breaks down” Brian Krebs Noted Cyber security Reporter
  • 4. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Peering into the future of cyber security  Understand the value of security in technology and shifting trends  Better insights to today’s challenges and prepare for tomorrows dangers  Identify opportunities and best practices for better security across the industry  Define what success looks like:  How do we prepare?  How do we achieve sustainable security?  Can we maintain an optimal balance of risk?
  • 5. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Chain Reactions Drive Cyber security Evolution…
  • 6. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Technology-Landscape Environmental changes
  • 7. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Technology-Landscape Environmental changes
  • 8. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Effects of Technology- Landscape changes • A growing target-rich environment of more users, data, and devices • Motivation for attacks rise as information and systems increase in value • New technology adoption, infrastructures, and usages creates a larger attack surface
  • 9. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Threat Evolution
  • 10. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Threat Evolution
  • 11. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Effects of the Threat Evolution •Attackers capabilities increases with investments, experience, and professional threat agents •Successes boosts confidence, raises the lure for more attacks and boldness to expand scope •Defenders struggle with a growing attack surface, challenging effectiveness models, lack of talent, and insufficient resources
  • 12. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Impacts and Effects
  • 13. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Impacts and Effects
  • 14. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM 4 Levels of Cyber security Impacts
  • 15. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Effects of Impacts •Users are impacted more and more. Awarenessincreases and security issues are recognized as a serious problem •Organizations feel the pain in losses, negative press, interruption, leadership, & competitiveness •Demands for more securely designed products, trustworthy vendors, better user-behaviors, advanced security systems, and more regulation to protect assets, usability, privacy, and availability
  • 16. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Defenses Respond
  • 17. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Defenses Respond
  • 18. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM The Future of Securing Technology
  • 19. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Good Practices will Emerge…
  • 20. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Analysis Conclusion  Verge of rapid changes, will get worse before it gets better  Threat landscape becomes more professional, organized, and funded  Technology ecosystem grows rapidly, creating new attack surfaces  Value of security rises in the eyes of the public, government, and commercial sectors  Attackers will outpace defenders in the short term, until fundamental changes take place  Defenses will evolve to be smarter, with optimal and sustainable security as the goal
  • 21. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Recommendations:  Leadership is crucial. Take definitive steps to be ahead of the risk curve. Do what is great, while it is small…  Seek an optimal and sustainable level of security  Stay aware of your threats, assets, controls, and exposures over time  Get in front of technology adoption and leverage security to enable rather than impede desired usages  Treat security as a cycle. Prevention is important, but is never impervious. Plan across the cycle, including feedback loops for continual improvement  Leverage defensive advantages, experts, and continuously implement industry best-known-methods  Stay positive, keep learning, and collaborate across the community. We are stronger together than individually
  • 22. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM  3.6B people by 2020. Source:ITU International Telecommunications Union  6.6B mobile cellular subscriptions in 2013. Source: WorldBank.org  Growth of devices chart. Source: BI Intelligence  50B ‘things’ connected by 2020. Source: Cisco  35% will be M2M connections. Source: Cisco  More Data growth estimate graphic Source: IDC  13x increase of mobile data 2012-17 Source: Cisco  3x data increase by 2018 Source: Cisco  30GB per person/mo. (2x 2013) Source: Cisco  18% CAGR of Business traffic Source: Cisco  $14.4 trillion dollars by 2022Internet of Things value. Source: Cisco  Theoretical network connections table. Source: Cisco  4x DC traffic by 2018, 31% CAGR. Source: Cisco  13,300 trillion connections by 2020. Source: Cisco  70% of organizations claim they do not have enough IT security staff. Source: PonemonInstitute report: Understaffed and at Risk  58% of senior staff positions and 36% of staff positions went unfilled in 2013. Source: PonemonInstitute report: Understaffed and at Risk  15% of vulnerabilities exploited Source: University of Maryland  Average Day in an Average Enterprise Stopwatch. Source: Check Point Security Report 2014  New malware at 4 per second. Source: McAfee  1M+ victims/day (12/second). Source: McAfee  $3T impact to the tech market: Source: World 2014 World Economic Forum’s Risk and Responsibility in a HyperconnectedWorld  20%-30% of IT budgets. Sources: McKinsey report (20-30%), Forrester 21%, SANS 11%-25%  49%, 200M+ total malware samples 240 per minute, 4 per second Source: McAfee Threat Report Q1 2014  50% Online adults victims of cybercrime or negative situations Source: Symantec  93% Organizations suffering data loss: Source: UK Government BIS survey 2013  $71B Worldwide IT security spending in 2014, 7.9% increase Source: Gartner  97% Organizations compromised by attacker bypassing all defenses. Source: FireEyeand Mandiantreport Cybersecurity’s Maginot Line  552M Total identities exposed in 2013, 493% increase Source: Symantec  Data Breach bubble graph. Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Security Industry Data and Sources
  • 23. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Questions? For more information, please visit www.deafrica.org or email info@deafrica.org

Hinweis der Redaktion

  1. This is when I give the demo
  2. Teaching English depends on print books not e-books at Universities in Guinea-Conakry, Guinea Bissau, DRC, Kenya C.A.R, Juba in Southern Sudan