SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
INFOSEC PROS SHARE THEIR MOST MEMORABLE MOMENTS
2 18
A Look Back At
“IN JANUARY, IT WAS REVEALED THAT RESEARCHERS
COULD TRACE THE GEOGRAPHIC LOCATIONS OF U.S.
MILITARY PERSONNEL VIA DATA FROM THEIR WEARABLE
FITNESS DEVICES. IN JULY, RESEARCHERS TRACED THE
REAL-TIME LOCATIONS OF INTELLIGENCE PERSONNEL
AROUND THE GLOBE … AND ALSO EXPOSED [THEIR] NAMES.
…PERHAPS, MORE THAN EVER, THESE EVENTS MADE IT
CLEAR THAT IOT PRIVACY BREACHES CAN HAVE A
DIRECT IMPACT ON NATIONAL SECURITY.”
-Justin Sherman
Cybersecurity Fellow
“ENORMOUS PROGRESS WAS
MADE TOWARDS GETTING
MULTI-FACTOR AUTHENTICATION
THE RECOGNITION IT DESERVES.
THEN, IT WAS DASHED TO
PIECES BY THE RECENT AZURE
2FA FAILURES… I WILL
PROBABLY SPEND 2019 TRYING
TO RECONCILE THIS. I HOPE
THAT THE 2FA ENGINEERS CAN
MAKE THIS FAILURE A DISTANT
MEMORY.” -Bob Covello
IT SECURITY DIRECTOR
“FROM POORLY CONFIGURED APPS, TO
AWARD PORTALS AND BREACHES OF
INFRASTRUCTURE, THE [airline] INDUSTRY
HAS BEEN GIVEN A WAKE-UP CALL.
DATA SECURITY IS A RESPONSIBILITY–
AS IMPORTANT AS MAINTAINING AN
AIRCRAFT IS MAINTAINING THE PRIVACY
OF THE PASSENGER.”
-Christopher Burgess
Cybersecurity ADVISOR
“UNLESS YOU ARE OF A PARTICULARLY GEEKY
PERSUASION, MOST FIRMWARE UPDATES LIKELY
PASS YOU BY. SPECTRE SHOWED THE WORLD THAT
HARDWARE-RELATED EXPLOITS WERE REAL, AND IT
HAD THE POTENTIAL TO AFFECT US ALL. IT ALSO
HIGHLIGHTED THE CHALLENGE OF PATCHING
HARDWARE AND ITS IMPACT.”
-Chris Hudson
PROFESSIONAL SERVICES
CONSULANT
“THE SINGLE, MOST MEMORABLE EVENT WAS THE
MASSIVE FERVOR OVER MELTDOWN AND SPECTRE…
TO ME, IT HIGHLIGHTS A CONSISTENT LACK OF
ALIGNMENT IN OUR INDUSTRY BETWEEN ACTUAL
THREATS AND WHAT WE PERCEIVE TO BE THREATS…
OUR INDUSTRY’S FOCUS IS OFTEN MORE CAPTURED
BY THE OUTPUT OF VENDORS, EVENTS AND
RESEARCHERS THAN BY THE ACTIONS OF CRIMINALS
AND VICTIM EXPERIENCES.”
-aDRIAN SANABRIA
VP, STRATEGY & PRODUCT MARKETING
“WE HAVE SEEN A REAL SHIFT TOWARDS OUTRAGE AND
TAKING ACTION TO TACKLE UNETHICAL USE OF DATA AND
TECHNOLOGY AMONG TECH LEADERS, THE DEVELOPER
COMMUNITY AND A MYRIAD OF ASSOCIATED GROUPS,
INCLUDING CONSUMERS. THAT CUMULATIVE WAVE
[AGAINST] INFRINGEMENT OF HUMAN RIGHTS
HAS DONE MORE TO DRIVE ATTENTION
TO SECURITY AND DATA PROTECTION
THAN ANYTHING BEFORE.”
-Sarah Clarke
Security grc specialist
“SAMSAM RANSOMWARE FIRST EMERGED IN 2016 BUT
IN 2018, IT’S BEEN MORE DESTRUCTIVE THAN EVER. THE
CITY OF ATLANTA AND MANY HOSPITALS AROUND THE
WORLD HAVE BEEN AMONGST ITS VICTIMS. NO
DECRYPTION TOOL HAS BEEN DEVELOPED FOR SAMSAM-
ENCRYPTED FILES AS OF YET… TO TOP THINGS OFF,
SAMSAM HAS BEEN FOUND FOR SALE ON THE DARK WEB
FOR ABOUT $750.”
-kim crawley
Cybersecurity writer
“FOR SO LONG, THE CONVENIENCE OF
SMARTPHONES, SOCIAL MEDIA, DIGITAL
ACCESS, ETC. HAS ECLIPSED CONCERNS
ABOUT PERSONAL PRIVACY AND
CORPORATE MARKETING.
COMBINE THE RECENT CONTROVERSIES
AROUND FAKE NEWS, POLITICAL
ADVERTISING AND CAMPAIGNING WITH
THE SEPT. FACEBOOK BREACH, AND WE
MAY HAVE REACH AN INFLECTION POINT.”
-MARIBETH PUSIESKI
ACCOUNT EXECUTIVE
“BEING CANADIAN IN A WORLD WHERE SECURITY
NEWS TENDS TO BE US-CENTRIC, I WAS EXCITED TO
SEE OUR MANDATORY DATA BREACH NOTIFICATION
LAW TAKE EFFECT. IT ISN’T PERFECT AS IT ONLY
MAKES NOTIFICATION NECESSARY WHEN THERE’S A
REAL RISK OF SIGNIFICANT HARM… THERE’S STILL
A LOT THAT CANADA HAS TO DO REGARDING
CYBERSECURITY BUT, FOR NOW, IT’S A START.”
-TYLER REGULY
MANAGER, SOFTWARE DEVELOPMENT
FOR MORE INFOSEC INSIGHTS,
VISIT TRIPWIRE.COM/BLOG
WHAT’S YOUR MOST
MEMORABLE 2018 MOMENT?
TWEET US @TRIPWIREINC

Contenu connexe

Similaire à A Look Back at 2018: The Most Memorable Cyber Moments

Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowJeremiah Grossman
 
Smart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way ForwardSmart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way ForwardCharles Reed Anderson
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
Reader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxReader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxniraj57
 
Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...Nixu Corporation
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping ScandalArun Prasaath
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Brent Guglielmino
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationBrad Deflin
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchismq3XKFc5XR
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareSecuricon
 
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...UNITEC
 
Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016Karim Baïna
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghPukhraj Singh
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013Kappa Data
 

Similaire à A Look Back at 2018: The Most Memorable Cyber Moments (20)

Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
 
Smart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way ForwardSmart Cities 2019: A New Way Forward
Smart Cities 2019: A New Way Forward
 
GARRIE.REEVES.37.5
GARRIE.REEVES.37.5GARRIE.REEVES.37.5
GARRIE.REEVES.37.5
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
Reader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxReader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docx
 
Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...Cyber warfare in the context of major military innovations by mattias almeflo...
Cyber warfare in the context of major military innovations by mattias almeflo...
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop PresentationCyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
Signaux Numériques 2015 par Antoine Chotard AEC 16 avril 2015 / Conférence Ci...
 
Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016Karim Baina Assises AUSIM 2016
Karim Baina Assises AUSIM 2016
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013
 

Plus de Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7Tripwire
 

Plus de Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 

Dernier

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

A Look Back at 2018: The Most Memorable Cyber Moments

  • 1. INFOSEC PROS SHARE THEIR MOST MEMORABLE MOMENTS 2 18 A Look Back At
  • 2. “IN JANUARY, IT WAS REVEALED THAT RESEARCHERS COULD TRACE THE GEOGRAPHIC LOCATIONS OF U.S. MILITARY PERSONNEL VIA DATA FROM THEIR WEARABLE FITNESS DEVICES. IN JULY, RESEARCHERS TRACED THE REAL-TIME LOCATIONS OF INTELLIGENCE PERSONNEL AROUND THE GLOBE … AND ALSO EXPOSED [THEIR] NAMES. …PERHAPS, MORE THAN EVER, THESE EVENTS MADE IT CLEAR THAT IOT PRIVACY BREACHES CAN HAVE A DIRECT IMPACT ON NATIONAL SECURITY.” -Justin Sherman Cybersecurity Fellow
  • 3. “ENORMOUS PROGRESS WAS MADE TOWARDS GETTING MULTI-FACTOR AUTHENTICATION THE RECOGNITION IT DESERVES. THEN, IT WAS DASHED TO PIECES BY THE RECENT AZURE 2FA FAILURES… I WILL PROBABLY SPEND 2019 TRYING TO RECONCILE THIS. I HOPE THAT THE 2FA ENGINEERS CAN MAKE THIS FAILURE A DISTANT MEMORY.” -Bob Covello IT SECURITY DIRECTOR
  • 4. “FROM POORLY CONFIGURED APPS, TO AWARD PORTALS AND BREACHES OF INFRASTRUCTURE, THE [airline] INDUSTRY HAS BEEN GIVEN A WAKE-UP CALL. DATA SECURITY IS A RESPONSIBILITY– AS IMPORTANT AS MAINTAINING AN AIRCRAFT IS MAINTAINING THE PRIVACY OF THE PASSENGER.” -Christopher Burgess Cybersecurity ADVISOR
  • 5. “UNLESS YOU ARE OF A PARTICULARLY GEEKY PERSUASION, MOST FIRMWARE UPDATES LIKELY PASS YOU BY. SPECTRE SHOWED THE WORLD THAT HARDWARE-RELATED EXPLOITS WERE REAL, AND IT HAD THE POTENTIAL TO AFFECT US ALL. IT ALSO HIGHLIGHTED THE CHALLENGE OF PATCHING HARDWARE AND ITS IMPACT.” -Chris Hudson PROFESSIONAL SERVICES CONSULANT
  • 6. “THE SINGLE, MOST MEMORABLE EVENT WAS THE MASSIVE FERVOR OVER MELTDOWN AND SPECTRE… TO ME, IT HIGHLIGHTS A CONSISTENT LACK OF ALIGNMENT IN OUR INDUSTRY BETWEEN ACTUAL THREATS AND WHAT WE PERCEIVE TO BE THREATS… OUR INDUSTRY’S FOCUS IS OFTEN MORE CAPTURED BY THE OUTPUT OF VENDORS, EVENTS AND RESEARCHERS THAN BY THE ACTIONS OF CRIMINALS AND VICTIM EXPERIENCES.” -aDRIAN SANABRIA VP, STRATEGY & PRODUCT MARKETING
  • 7. “WE HAVE SEEN A REAL SHIFT TOWARDS OUTRAGE AND TAKING ACTION TO TACKLE UNETHICAL USE OF DATA AND TECHNOLOGY AMONG TECH LEADERS, THE DEVELOPER COMMUNITY AND A MYRIAD OF ASSOCIATED GROUPS, INCLUDING CONSUMERS. THAT CUMULATIVE WAVE [AGAINST] INFRINGEMENT OF HUMAN RIGHTS HAS DONE MORE TO DRIVE ATTENTION TO SECURITY AND DATA PROTECTION THAN ANYTHING BEFORE.” -Sarah Clarke Security grc specialist
  • 8. “SAMSAM RANSOMWARE FIRST EMERGED IN 2016 BUT IN 2018, IT’S BEEN MORE DESTRUCTIVE THAN EVER. THE CITY OF ATLANTA AND MANY HOSPITALS AROUND THE WORLD HAVE BEEN AMONGST ITS VICTIMS. NO DECRYPTION TOOL HAS BEEN DEVELOPED FOR SAMSAM- ENCRYPTED FILES AS OF YET… TO TOP THINGS OFF, SAMSAM HAS BEEN FOUND FOR SALE ON THE DARK WEB FOR ABOUT $750.” -kim crawley Cybersecurity writer
  • 9. “FOR SO LONG, THE CONVENIENCE OF SMARTPHONES, SOCIAL MEDIA, DIGITAL ACCESS, ETC. HAS ECLIPSED CONCERNS ABOUT PERSONAL PRIVACY AND CORPORATE MARKETING. COMBINE THE RECENT CONTROVERSIES AROUND FAKE NEWS, POLITICAL ADVERTISING AND CAMPAIGNING WITH THE SEPT. FACEBOOK BREACH, AND WE MAY HAVE REACH AN INFLECTION POINT.” -MARIBETH PUSIESKI ACCOUNT EXECUTIVE
  • 10. “BEING CANADIAN IN A WORLD WHERE SECURITY NEWS TENDS TO BE US-CENTRIC, I WAS EXCITED TO SEE OUR MANDATORY DATA BREACH NOTIFICATION LAW TAKE EFFECT. IT ISN’T PERFECT AS IT ONLY MAKES NOTIFICATION NECESSARY WHEN THERE’S A REAL RISK OF SIGNIFICANT HARM… THERE’S STILL A LOT THAT CANADA HAS TO DO REGARDING CYBERSECURITY BUT, FOR NOW, IT’S A START.” -TYLER REGULY MANAGER, SOFTWARE DEVELOPMENT
  • 11. FOR MORE INFOSEC INSIGHTS, VISIT TRIPWIRE.COM/BLOG WHAT’S YOUR MOST MEMORABLE 2018 MOMENT? TWEET US @TRIPWIREINC