SlideShare une entreprise Scribd logo
1  sur  23
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
A Bright Future in Cyber security
Olufemi VAUGHAN CISA, ITIL
ICSDL Instructor
July, 2015
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
 Technology connects and enriches the lives of
every person on earth
 Security is critical to protect computing
technology from threats which undermine the
health of the industry
DeAfrica
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
DeAfrica
 “...If security breaks down, technology breaks down”
Brian Krebs
Noted Cyber security Reporter
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Peering into the future of cyber
security
 Understand the value of security in technology and shifting trends
 Better insights to today’s challenges and prepare for tomorrows
dangers
 Identify opportunities and best practices for better security across the
industry
 Define what success looks like:
 How do we prepare?
 How do we achieve sustainable security?
 Can we maintain an optimal balance of risk?
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Chain Reactions Drive Cyber
security Evolution…
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Technology-Landscape
Environmental changes
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Technology-Landscape
Environmental changes
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Effects of Technology-
Landscape changes
• A growing target-rich environment of more users,
data, and devices
• Motivation for attacks rise as information and
systems increase in value
• New technology adoption, infrastructures, and
usages creates a larger attack surface
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Threat Evolution
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Threat Evolution
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Effects of the Threat
Evolution
•Attackers capabilities increases with
investments, experience, and professional threat
agents
•Successes boosts confidence, raises the lure for
more attacks and boldness to expand scope
•Defenders struggle with a growing attack
surface, challenging effectiveness models, lack of
talent, and insufficient resources
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Impacts and Effects
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Impacts and Effects
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
4 Levels of Cyber security Impacts
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Effects of Impacts
•Users are impacted more and more.
Awarenessincreases and security issues are
recognized as a serious problem
•Organizations feel the pain in losses, negative
press, interruption, leadership, & competitiveness
•Demands for more securely designed products,
trustworthy vendors, better user-behaviors,
advanced security systems, and more regulation
to protect assets, usability, privacy, and
availability
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Defenses Respond
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Defenses Respond
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
The Future of Securing Technology
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Good Practices will Emerge…
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Analysis Conclusion
 Verge of rapid changes, will get worse before
it gets better
 Threat landscape becomes more
professional, organized, and funded
 Technology ecosystem grows rapidly,
creating new attack surfaces
 Value of security rises in the eyes of the
public, government, and commercial sectors
 Attackers will outpace defenders in the short
term, until fundamental changes take place
 Defenses will evolve to be smarter, with
optimal and sustainable security as the goal
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Recommendations:
 Leadership is crucial. Take definitive steps to be ahead of the risk curve. Do
what is great, while it is small…
 Seek an optimal and sustainable level of security
 Stay aware of your threats, assets, controls, and exposures over time
 Get in front of technology adoption and leverage security to enable rather
than impede desired usages
 Treat security as a cycle. Prevention is important, but is never impervious.
Plan across the cycle, including feedback loops for continual improvement
 Leverage defensive advantages, experts, and continuously implement
industry best-known-methods
 Stay positive, keep learning, and collaborate across the community. We are
stronger together than individually
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
 3.6B people by 2020. Source:ITU International Telecommunications Union
 6.6B mobile cellular subscriptions in 2013. Source: WorldBank.org
 Growth of devices chart. Source: BI Intelligence
 50B ‘things’ connected by 2020. Source: Cisco
 35% will be M2M connections. Source: Cisco
 More Data growth estimate graphic Source: IDC
 13x increase of mobile data 2012-17 Source: Cisco
 3x data increase by 2018 Source: Cisco
 30GB per person/mo. (2x 2013) Source: Cisco
 18% CAGR of Business traffic Source: Cisco
 $14.4 trillion dollars by 2022Internet of Things value. Source: Cisco
 Theoretical network connections table. Source: Cisco
 4x DC traffic by 2018, 31% CAGR. Source: Cisco
 13,300 trillion connections by 2020. Source: Cisco
 70% of organizations claim they do not have enough IT security staff. Source: PonemonInstitute report: Understaffed and at Risk
 58% of senior staff positions and 36% of staff positions went unfilled in 2013. Source: PonemonInstitute report: Understaffed and at Risk
 15% of vulnerabilities exploited Source: University of Maryland
 Average Day in an Average Enterprise Stopwatch. Source: Check Point Security Report 2014
 New malware at 4 per second. Source: McAfee
 1M+ victims/day (12/second). Source: McAfee
 $3T impact to the tech market: Source: World 2014 World Economic Forum’s Risk and Responsibility in a HyperconnectedWorld
 20%-30% of IT budgets. Sources: McKinsey report (20-30%), Forrester 21%, SANS 11%-25%
 49%, 200M+ total malware samples 240 per minute, 4 per second Source: McAfee Threat Report Q1 2014
 50% Online adults victims of cybercrime or negative situations Source: Symantec
 93% Organizations suffering data loss: Source: UK Government BIS survey 2013
 $71B Worldwide IT security spending in 2014, 7.9% increase Source: Gartner
 97% Organizations compromised by attacker bypassing all defenses. Source: FireEyeand Mandiantreport Cybersecurity’s Maginot Line
 552M Total identities exposed in 2013, 493% increase Source: Symantec
 Data Breach bubble graph. Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Security Industry Data and Sources
Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM
Questions?
For more information,
please visit
www.deafrica.org
or email
info@deafrica.org

Contenu connexe

Tendances

Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...IBM Center for Applied Insights
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shahMr Nyak
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Security Innovation
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 

Tendances (20)

Pace IT - Secure Mobile Devices
Pace IT - Secure Mobile DevicesPace IT - Secure Mobile Devices
Pace IT - Secure Mobile Devices
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
CERT Certification
CERT CertificationCERT Certification
CERT Certification
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Quantifying Cyber Risk
Quantifying Cyber Risk Quantifying Cyber Risk
Quantifying Cyber Risk
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 

En vedette

Flash comment: Estonia - December 9, 2011
Flash comment: Estonia - December 9, 2011Flash comment: Estonia - December 9, 2011
Flash comment: Estonia - December 9, 2011Swedbank
 
Sílabo materia pedagogía patricio tobar
Sílabo materia pedagogía patricio tobarSílabo materia pedagogía patricio tobar
Sílabo materia pedagogía patricio tobarCarolina Andrango
 
The usefulness of the tools & strategies for planning and assesing learning.
The usefulness of the tools & strategies for planning and assesing learning.The usefulness of the tools & strategies for planning and assesing learning.
The usefulness of the tools & strategies for planning and assesing learning.Lisselot Feliz
 
Resume 2015 linked in copy
Resume 2015 linked in copyResume 2015 linked in copy
Resume 2015 linked in copyBrennen Chavez
 
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrand
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrandHotel auvergne-puy-de-dome-vulcania-clermont-ferrand
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrandPhilDejant
 
Ppa con tic final belkis rodriguez
Ppa con tic   final belkis rodriguezPpa con tic   final belkis rodriguez
Ppa con tic final belkis rodriguezdiplomm
 
20120721_RxTstury05-LT
20120721_RxTstury05-LT20120721_RxTstury05-LT
20120721_RxTstury05-LTChiaki Nishi
 
Se hacen tesis de diseño de imagen y estilo
Se hacen tesis de diseño de imagen y estilo Se hacen tesis de diseño de imagen y estilo
Se hacen tesis de diseño de imagen y estilo bastiano1000
 
20151024コクヨイベント
20151024コクヨイベント20151024コクヨイベント
20151024コクヨイベント忠憲 倉下
 
Curso para sentidos do cerebro
Curso para sentidos do cerebroCurso para sentidos do cerebro
Curso para sentidos do cerebroMarcelo Diedrich
 
Seasons of the year
Seasons of the yearSeasons of the year
Seasons of the yearhuberlys1989
 
Organizadores generalidades sobre.teoria sdocx
Organizadores generalidades sobre.teoria sdocxOrganizadores generalidades sobre.teoria sdocx
Organizadores generalidades sobre.teoria sdocxDaysi Valle
 
Aplicación de estrategias en el nivel inicial
Aplicación de estrategias en el nivel inicialAplicación de estrategias en el nivel inicial
Aplicación de estrategias en el nivel inicialyeimylinneth
 

En vedette (17)

Medicina Humana
Medicina Humana Medicina Humana
Medicina Humana
 
Flash comment: Estonia - December 9, 2011
Flash comment: Estonia - December 9, 2011Flash comment: Estonia - December 9, 2011
Flash comment: Estonia - December 9, 2011
 
Sílabo materia pedagogía patricio tobar
Sílabo materia pedagogía patricio tobarSílabo materia pedagogía patricio tobar
Sílabo materia pedagogía patricio tobar
 
The usefulness of the tools & strategies for planning and assesing learning.
The usefulness of the tools & strategies for planning and assesing learning.The usefulness of the tools & strategies for planning and assesing learning.
The usefulness of the tools & strategies for planning and assesing learning.
 
Resume 2015 linked in copy
Resume 2015 linked in copyResume 2015 linked in copy
Resume 2015 linked in copy
 
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrand
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrandHotel auvergne-puy-de-dome-vulcania-clermont-ferrand
Hotel auvergne-puy-de-dome-vulcania-clermont-ferrand
 
Ppa con tic final belkis rodriguez
Ppa con tic   final belkis rodriguezPpa con tic   final belkis rodriguez
Ppa con tic final belkis rodriguez
 
20120721_RxTstury05-LT
20120721_RxTstury05-LT20120721_RxTstury05-LT
20120721_RxTstury05-LT
 
Se hacen tesis de diseño de imagen y estilo
Se hacen tesis de diseño de imagen y estilo Se hacen tesis de diseño de imagen y estilo
Se hacen tesis de diseño de imagen y estilo
 
20151024コクヨイベント
20151024コクヨイベント20151024コクヨイベント
20151024コクヨイベント
 
Curso para sentidos do cerebro
Curso para sentidos do cerebroCurso para sentidos do cerebro
Curso para sentidos do cerebro
 
高雄市製造業概況(傳統產業加值轉型推動計畫)
高雄市製造業概況(傳統產業加值轉型推動計畫)高雄市製造業概況(傳統產業加值轉型推動計畫)
高雄市製造業概況(傳統產業加值轉型推動計畫)
 
encuesta spss
encuesta spss encuesta spss
encuesta spss
 
Efficacy of RONOZYME® HiPhos in Turkey Poult Diets
Efficacy of RONOZYME® HiPhos in Turkey Poult DietsEfficacy of RONOZYME® HiPhos in Turkey Poult Diets
Efficacy of RONOZYME® HiPhos in Turkey Poult Diets
 
Seasons of the year
Seasons of the yearSeasons of the year
Seasons of the year
 
Organizadores generalidades sobre.teoria sdocx
Organizadores generalidades sobre.teoria sdocxOrganizadores generalidades sobre.teoria sdocx
Organizadores generalidades sobre.teoria sdocx
 
Aplicación de estrategias en el nivel inicial
Aplicación de estrategias en el nivel inicialAplicación de estrategias en el nivel inicial
Aplicación de estrategias en el nivel inicial
 

Similaire à Bright future ahead in Cybersecurity

Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceMoses Kemibaro
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultSOCVault
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...theindustryviewmagaz
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...BusinessBerg
 
Cyber Security Courses in Kerala
Cyber Security Courses in KeralaCyber Security Courses in Kerala
Cyber Security Courses in Keralaofnso123
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxANA Cyber Security Forensic Pvt. Ltd.
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity MarketingAlex Weishaupt
 

Similaire à Bright future ahead in Cybersecurity (20)

Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
Cyber Security Courses in Kerala
Cyber Security Courses in KeralaCyber Security Courses in Kerala
Cyber Security Courses in Kerala
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 

Plus de Vaughan Olufemi ACIB, AICEN, ANIM (6)

Retrieval and Workflows
Retrieval and WorkflowsRetrieval and Workflows
Retrieval and Workflows
 
Document Management System
Document Management SystemDocument Management System
Document Management System
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Careers in cyber security
Careers in cyber securityCareers in cyber security
Careers in cyber security
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Bright future ahead in Cybersecurity

  • 1. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM A Bright Future in Cyber security Olufemi VAUGHAN CISA, ITIL ICSDL Instructor July, 2015
  • 2. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM  Technology connects and enriches the lives of every person on earth  Security is critical to protect computing technology from threats which undermine the health of the industry DeAfrica
  • 3. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM DeAfrica  “...If security breaks down, technology breaks down” Brian Krebs Noted Cyber security Reporter
  • 4. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Peering into the future of cyber security  Understand the value of security in technology and shifting trends  Better insights to today’s challenges and prepare for tomorrows dangers  Identify opportunities and best practices for better security across the industry  Define what success looks like:  How do we prepare?  How do we achieve sustainable security?  Can we maintain an optimal balance of risk?
  • 5. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Chain Reactions Drive Cyber security Evolution…
  • 6. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Technology-Landscape Environmental changes
  • 7. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Technology-Landscape Environmental changes
  • 8. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Effects of Technology- Landscape changes • A growing target-rich environment of more users, data, and devices • Motivation for attacks rise as information and systems increase in value • New technology adoption, infrastructures, and usages creates a larger attack surface
  • 9. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Threat Evolution
  • 10. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Threat Evolution
  • 11. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Effects of the Threat Evolution •Attackers capabilities increases with investments, experience, and professional threat agents •Successes boosts confidence, raises the lure for more attacks and boldness to expand scope •Defenders struggle with a growing attack surface, challenging effectiveness models, lack of talent, and insufficient resources
  • 12. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Impacts and Effects
  • 13. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Impacts and Effects
  • 14. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM 4 Levels of Cyber security Impacts
  • 15. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Effects of Impacts •Users are impacted more and more. Awarenessincreases and security issues are recognized as a serious problem •Organizations feel the pain in losses, negative press, interruption, leadership, & competitiveness •Demands for more securely designed products, trustworthy vendors, better user-behaviors, advanced security systems, and more regulation to protect assets, usability, privacy, and availability
  • 16. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Defenses Respond
  • 17. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Defenses Respond
  • 18. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM The Future of Securing Technology
  • 19. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Good Practices will Emerge…
  • 20. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Analysis Conclusion  Verge of rapid changes, will get worse before it gets better  Threat landscape becomes more professional, organized, and funded  Technology ecosystem grows rapidly, creating new attack surfaces  Value of security rises in the eyes of the public, government, and commercial sectors  Attackers will outpace defenders in the short term, until fundamental changes take place  Defenses will evolve to be smarter, with optimal and sustainable security as the goal
  • 21. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Recommendations:  Leadership is crucial. Take definitive steps to be ahead of the risk curve. Do what is great, while it is small…  Seek an optimal and sustainable level of security  Stay aware of your threats, assets, controls, and exposures over time  Get in front of technology adoption and leverage security to enable rather than impede desired usages  Treat security as a cycle. Prevention is important, but is never impervious. Plan across the cycle, including feedback loops for continual improvement  Leverage defensive advantages, experts, and continuously implement industry best-known-methods  Stay positive, keep learning, and collaborate across the community. We are stronger together than individually
  • 22. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM  3.6B people by 2020. Source:ITU International Telecommunications Union  6.6B mobile cellular subscriptions in 2013. Source: WorldBank.org  Growth of devices chart. Source: BI Intelligence  50B ‘things’ connected by 2020. Source: Cisco  35% will be M2M connections. Source: Cisco  More Data growth estimate graphic Source: IDC  13x increase of mobile data 2012-17 Source: Cisco  3x data increase by 2018 Source: Cisco  30GB per person/mo. (2x 2013) Source: Cisco  18% CAGR of Business traffic Source: Cisco  $14.4 trillion dollars by 2022Internet of Things value. Source: Cisco  Theoretical network connections table. Source: Cisco  4x DC traffic by 2018, 31% CAGR. Source: Cisco  13,300 trillion connections by 2020. Source: Cisco  70% of organizations claim they do not have enough IT security staff. Source: PonemonInstitute report: Understaffed and at Risk  58% of senior staff positions and 36% of staff positions went unfilled in 2013. Source: PonemonInstitute report: Understaffed and at Risk  15% of vulnerabilities exploited Source: University of Maryland  Average Day in an Average Enterprise Stopwatch. Source: Check Point Security Report 2014  New malware at 4 per second. Source: McAfee  1M+ victims/day (12/second). Source: McAfee  $3T impact to the tech market: Source: World 2014 World Economic Forum’s Risk and Responsibility in a HyperconnectedWorld  20%-30% of IT budgets. Sources: McKinsey report (20-30%), Forrester 21%, SANS 11%-25%  49%, 200M+ total malware samples 240 per minute, 4 per second Source: McAfee Threat Report Q1 2014  50% Online adults victims of cybercrime or negative situations Source: Symantec  93% Organizations suffering data loss: Source: UK Government BIS survey 2013  $71B Worldwide IT security spending in 2014, 7.9% increase Source: Gartner  97% Organizations compromised by attacker bypassing all defenses. Source: FireEyeand Mandiantreport Cybersecurity’s Maginot Line  552M Total identities exposed in 2013, 493% increase Source: Symantec  Data Breach bubble graph. Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Security Industry Data and Sources
  • 23. Distance Education for Africa / Enseignement á Distance Pour L’Afrique WWW.DEAFRICA.COM Questions? For more information, please visit www.deafrica.org or email info@deafrica.org

Notes de l'éditeur

  1. This is when I give the demo
  2. Teaching English depends on print books not e-books at Universities in Guinea-Conakry, Guinea Bissau, DRC, Kenya C.A.R, Juba in Southern Sudan