Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks...
Transcript of Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks...
![Page 1: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/1.jpg)
Expect the UnexpectedRik FergusonVice President, Security ResearchTrend Micro
@rik_ferguson
![Page 2: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/2.jpg)
THE UNEXPECTED
WE’VE GOT NEXT-GEN THREAT DEFENCE!
Source: @MatiasKatz
![Page 3: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/3.jpg)
THREAT ACTORS
OrganisedCybercrime
Industrial Espionage
Activists / Terrorists
State Sponsored
![Page 4: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/4.jpg)
TECHNOLOGY DISRUPTIONHow digital disruption will impact cybersecurity
![Page 5: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/5.jpg)
WHAT’S ONE THING IN COMMON HERE?
![Page 6: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/6.jpg)
EXPECT TECHNOLOGY DISRUPTION
“Digital disruption,
when properly
understood, should
terrify you.”
James McQuivey
Author of “Digital Disruption:
Unleashing the Next Wave of Innovation”
![Page 7: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/7.jpg)
DISRUPTION #1: CLOUD COMPUTING
Cloud computing has disrupted
every industry it has touched.
Enable more disruptive
technologies to come.
Hackers will find and attack
weaknesses in the building blocks
and joints of cloud computing.
![Page 8: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/8.jpg)
DISRUPTION #2: MOBILE
“Every once in a while a revolutionary
product comes along that changes
everything.”
- Steve Jobs, 2007
Empowering Wearable
Technologies, Location Sensing
and Internet of Things (IoT) today.
Cybercriminals can strike their
targets from anywhere.
More entry points for them to
infiltrate an unsecured system or
network.
![Page 9: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/9.jpg)
DISRUPTION #3: BIG DATA
Organisations will use Big Data to satisfy their customers better.
Hackers will also use Big Data to exploit their victims better.
![Page 10: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/10.jpg)
DISRUPTION #4: SOCIAL MEDIA
Social media helps reach people easier and quicker.
Cybercriminals want to reach you similarly too.
![Page 11: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/11.jpg)
DISRUPTION #5: INTERNET OF THINGS
Anything and everything
that connects with the
Internet can be hacked.
IoT could be the “Network
of all networks” in the
future.
25 billion connected things by 2020 – Gartner
Immature and experimental
now.
![Page 12: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/12.jpg)
UP AND COMING F
![Page 13: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/13.jpg)
THE FUTURE OF CYBER
THREATS
![Page 14: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/14.jpg)
THE FUTURE OF CYBER THREATS
Disruptive technologies will
produce large, complex and
intelligent hyper-connected
networks.
Cybercriminals will follow
technology disruption closely
to develop and launch attacks
in unexpected ways.
![Page 15: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/15.jpg)
THE FUTURE OF CYBER THREATS
Cloud-powered Botnets and DDoS Attacks
Electronic Attacks on Critical
Infrastructure
Micro-Criminality Bio-hacks for Multi-factor Authentication
Cyber-enabled Violence
Malware for Humans
Cyber Gang Wars
High Impact, Targeted Identity Theft and Avatar
Hijack
Sophisticated Reputation Manipulation
Misuse of Augmented Reality
Abuse of Unmanned Vehicles and
Smart Machines
Hacks against Internet of Things
with Direct Physical Impact
Source: Project 2020 by ICSPA, Europol and Trend Micro
![Page 16: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/16.jpg)
HOW CYBERSECURITY CAN
PREVAIL
![Page 17: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/17.jpg)
17
BASIC INTERMEDIATE ADVANCED
Endpoint Security
Network Segmentation
Firewall & IPS
Web Security
Application Security
Two-Factor Authentication
Mobile Security
Data Security
Advanced Threat
Detection
Security Intelligence
Network Forensics
Connected Threat
Defence
SECURITY OPERATIONS
Access Management • Change Management • Vulnerability Management • Incident
Response
DEFENDING AGAINST THE UNEXPECTED
![Page 18: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/18.jpg)
DEFENDING AGAINST THE UNEXPECTED
Assess Educate Identify gaps KPIsContinuous Improvement
Report
Action Plan for Cybersecurity Leaders
![Page 19: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/19.jpg)
THEN WE CAN BE A BIT MORE LIKE HIM F..
FEARLESS
![Page 20: Expect the Unexpected · THE FUTURE OF CYBER THREATS Cloud-powered Botnets and DDoSAttacks Electronic Attacks on Critical Infrastructure Micro-Criminality Bio-hacks for Multi-factor](https://reader034.fdocuments.net/reader034/viewer/2022042220/5ec703ff1c09da2dc02aa3ff/html5/thumbnails/20.jpg)
Thank You