SlideShare une entreprise Scribd logo
1  sur  51
 
Introduction ,[object Object],[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation
Copyright 2011, All Rights Reserved – Teksouth Corporation Our old preconceptions about IT Security & its relationship with modern society are melting away rapidly…
The  Hype Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Sometimes the Hype can get in the way of more serious discussions. Those discussions are necessary though…
The  Reality Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Nearly every major component of the automobile was well-defined by the early part of the 20 th  Century.  We didn’t realize how the car would transform society until later that century…
About  Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Logical  Evolution Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Section 1: Our Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation
Our  Scope Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cyber  Technology Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Converged  Mobile Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Quantum  Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Quantum  Computing Copyright 2011, All Rights Reserved – Teksouth Corporation Quantum Computing may not lead to Artificial Intelligence, but it doesn’t have to. Increased Velocity is a game changer all by itself.
Cloud   Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cloud   Computing Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Predictive  Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Predictive  Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation
Behavioral  Identity Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Dynamic   Networks Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Cyber Security  Threats Copyright 2011, All Rights Reserved – Teksouth Corporation The Nature of Cyber Threats will evolve as rapidly as emerging technologies. A new generation has now had time to re-envision the rules – Cyber Threats have matured and now will move towards ever greater sophistication.
The Dynamic   Perimeter Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation
Threat   Management Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Threats aren’t properly understood until after they are manifested. This places us at an immediate disadvantage and tends to force us to play catch up.
Threat   Patterns Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Threat   Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber  Practice Copyright 2011, All Rights Reserved – Teksouth Corporation The scope of what Cyber Security is as a practice or career field is still in flux. This will remain the case for the next five years at least. By 2021 it will be well defined but won’t resemble what we’re doing now at all…
Multi- Dimensional Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Cyber Architecture will become a major career path, practice approach for all of IT.
Cyber   Architecture Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Holistic   Lifecycle Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation The most valuable skills for a Cyber Security career in 2021 will not be a focus in any specific technology, but rather a analytical mindset and problem solving focus…
Practice   Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Section 2: A New Lexicon
A New   Lexicon Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation If you can’t describe something properly; how can you react to it or exploit it ? Words do make a difference.
Collective   Intelligence Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Behavioral   Identity Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Zombification   Copyright 2011, All Rights Reserved – Teksouth Corporation Zombification is the ability to convert healthy or safe user IDs into attack vectors. This type of breach is associated with destruction as opposed to theft or disruption.
Cyber   Assurance Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Dynamic   Networks Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object]
Cyber   Fracking Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
Copyright 2011, All Rights Reserved – Teksouth Corporation Section 3: About Teksouth & TEC CYBER
We are  Teksouth ,[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation
The TEC  Practice Family Copyright 2011, All Rights Reserved – Teksouth Corporation
Our  Vision Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
TEC  CYBER Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion Copyright 2011, All Rights Reserved – Teksouth Corporation ,[object Object],[object Object],[object Object]
TEC  Contact Information ,[object Object],[object Object],[object Object],[object Object],Copyright 2011, All Rights Reserved – Teksouth Corporation

Contenu connexe

Tendances

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 

Tendances (20)

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Application security
Application securityApplication security
Application security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Data breach
Data breachData breach
Data breach
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 

Similaire à The Future of Cyber Security

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT SolutionsDMIMarketing
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxAdvance Tech
 
Five Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionFive Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionCognizant
 
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...Anil
 
Process oriented architecture for digital transformation 2015
Process oriented architecture for digital transformation   2015Process oriented architecture for digital transformation   2015
Process oriented architecture for digital transformation 2015Vinay Mummigatti
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging TechnologiesAnil Kumar
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and AnsweredADCBarcode
 

Similaire à The Future of Cyber Security (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
188
188188
188
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Five Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionFive Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological Evolution
 
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
How Convergence and Disruptive Technologies Will Shape the Way We Work and Li...
 
Process oriented architecture for digital transformation 2015
Process oriented architecture for digital transformation   2015Process oriented architecture for digital transformation   2015
Process oriented architecture for digital transformation 2015
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 

Plus de Stephen Lahanas

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseStephen Lahanas
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroStephen Lahanas
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesStephen Lahanas
 
Redefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyStephen Lahanas
 
Intelligent Content & Search
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & SearchStephen Lahanas
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture FrameworksStephen Lahanas
 
Innovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesInnovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesStephen Lahanas
 
Redefining Politics Part 1
Redefining Politics Part 1Redefining Politics Part 1
Redefining Politics Part 1Stephen Lahanas
 
Semantech Inc. InnovationWorx
Semantech Inc. InnovationWorxSemantech Inc. InnovationWorx
Semantech Inc. InnovationWorxStephen Lahanas
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewStephen Lahanas
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Stephen Lahanas
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems IntegrationStephen Lahanas
 
Semantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsSemantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsStephen Lahanas
 
Semantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionSemantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionStephen Lahanas
 
The Global AIM Reference Architecture
The Global AIM Reference ArchitectureThe Global AIM Reference Architecture
The Global AIM Reference ArchitectureStephen Lahanas
 
Services (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIServices (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIStephen Lahanas
 

Plus de Stephen Lahanas (20)

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Semantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - IntroSemantech Inc. - Mastering Enterprise Big Data - Intro
Semantech Inc. - Mastering Enterprise Big Data - Intro
 
Semantech 2014 Corporate Capabilties
Semantech 2014 Corporate CapabiltiesSemantech 2014 Corporate Capabilties
Semantech 2014 Corporate Capabilties
 
Redefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political OntologyRedefining Politics 2 - A New Political Ontology
Redefining Politics 2 - A New Political Ontology
 
Intelligent Content & Search
Intelligent Content & SearchIntelligent Content & Search
Intelligent Content & Search
 
Semantic intelligence
Semantic intelligenceSemantic intelligence
Semantic intelligence
 
Enterprise Architecture Frameworks
Enterprise Architecture FrameworksEnterprise Architecture Frameworks
Enterprise Architecture Frameworks
 
Innovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem SpacesInnovation as Problem Solving: Managing Problem Spaces
Innovation as Problem Solving: Managing Problem Spaces
 
Redefining Politics Part 1
Redefining Politics Part 1Redefining Politics Part 1
Redefining Politics Part 1
 
Semantech Inc. InnovationWorx
Semantech Inc. InnovationWorxSemantech Inc. InnovationWorx
Semantech Inc. InnovationWorx
 
Virtual Trade Mission
Virtual Trade MissionVirtual Trade Mission
Virtual Trade Mission
 
Semantech Inc. - Executive Overview
Semantech Inc. - Executive OverviewSemantech Inc. - Executive Overview
Semantech Inc. - Executive Overview
 
Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011Semantech Inc.'s Corporate Capabilities 2011
Semantech Inc.'s Corporate Capabilities 2011
 
Dynamic Learning
Dynamic LearningDynamic Learning
Dynamic Learning
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems Integration
 
Semantech Inc. ERP Solutions
Semantech Inc. ERP SolutionsSemantech Inc. ERP Solutions
Semantech Inc. ERP Solutions
 
Semantech Inc. Architecture Fusion
Semantech Inc. Architecture FusionSemantech Inc. Architecture Fusion
Semantech Inc. Architecture Fusion
 
Policy Integration
Policy IntegrationPolicy Integration
Policy Integration
 
The Global AIM Reference Architecture
The Global AIM Reference ArchitectureThe Global AIM Reference Architecture
The Global AIM Reference Architecture
 
Services (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOIServices (SOA) Oriented Integration SOI
Services (SOA) Oriented Integration SOI
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

The Future of Cyber Security

  • 1.  
  • 2.
  • 3. Copyright 2011, All Rights Reserved – Teksouth Corporation Our old preconceptions about IT Security & its relationship with modern society are melting away rapidly…
  • 4.
  • 5. Copyright 2011, All Rights Reserved – Teksouth Corporation Sometimes the Hype can get in the way of more serious discussions. Those discussions are necessary though…
  • 6.
  • 7. Copyright 2011, All Rights Reserved – Teksouth Corporation Nearly every major component of the automobile was well-defined by the early part of the 20 th Century. We didn’t realize how the car would transform society until later that century…
  • 8.
  • 9.
  • 10. Section 1: Our Predictions Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Quantum Computing Copyright 2011, All Rights Reserved – Teksouth Corporation Quantum Computing may not lead to Artificial Intelligence, but it doesn’t have to. Increased Velocity is a game changer all by itself.
  • 16.
  • 17.
  • 18.
  • 19. Predictive Semantics Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 20.
  • 21.
  • 22. Cyber Security Threats Copyright 2011, All Rights Reserved – Teksouth Corporation The Nature of Cyber Threats will evolve as rapidly as emerging technologies. A new generation has now had time to re-envision the rules – Cyber Threats have matured and now will move towards ever greater sophistication.
  • 23.
  • 24. Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 25.
  • 26. Copyright 2011, All Rights Reserved – Teksouth Corporation Threats aren’t properly understood until after they are manifested. This places us at an immediate disadvantage and tends to force us to play catch up.
  • 27.
  • 28.
  • 29. Cyber Practice Copyright 2011, All Rights Reserved – Teksouth Corporation The scope of what Cyber Security is as a practice or career field is still in flux. This will remain the case for the next five years at least. By 2021 it will be well defined but won’t resemble what we’re doing now at all…
  • 30.
  • 31. Copyright 2011, All Rights Reserved – Teksouth Corporation Cyber Architecture will become a major career path, practice approach for all of IT.
  • 32.
  • 33.
  • 34. Copyright 2011, All Rights Reserved – Teksouth Corporation The most valuable skills for a Cyber Security career in 2021 will not be a focus in any specific technology, but rather a analytical mindset and problem solving focus…
  • 35.
  • 36. Copyright 2011, All Rights Reserved – Teksouth Corporation Section 2: A New Lexicon
  • 37.
  • 38. Copyright 2011, All Rights Reserved – Teksouth Corporation If you can’t describe something properly; how can you react to it or exploit it ? Words do make a difference.
  • 39.
  • 40.
  • 41. Zombification Copyright 2011, All Rights Reserved – Teksouth Corporation Zombification is the ability to convert healthy or safe user IDs into attack vectors. This type of breach is associated with destruction as opposed to theft or disruption.
  • 42.
  • 43.
  • 44.
  • 45. Copyright 2011, All Rights Reserved – Teksouth Corporation Section 3: About Teksouth & TEC CYBER
  • 46.
  • 47. The TEC Practice Family Copyright 2011, All Rights Reserved – Teksouth Corporation
  • 48.
  • 49.
  • 50.
  • 51.