Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
2020: The Future
of Cybersecurity
in The Next
Decade
www.gpetrium.com
As Weak as its Weakest Links:
The Internet of Things
“The Internet of Things (IoT)
will continue to evolve and
create comp...
As Weak as its Weakest Links:
Company Resources
“It will no longer be enough to
not be on the list of companies
that have ...
Cybersecurity and Individuals:
Comfort Technologies
“Executives will need to balance potential reputational
damage followe...
Cybersecurity and Individuals:
“The private sector will continue
to realize that they are not able
to fight certain types ...
Cybersecurity and Individuals:
“Cybersecurity thefts will propel the
creation of new business
adversaries causing drastic ...
Cybersecurity and Government:
Social Credits
“The interest in creating an
environment with stronger
data privacy will grow...
Cybersecurity and Government:
Regulatory Compliance
“AI and Machine
Learning cyber
security solutions will
go head-to-head...
Cybersecurity and Government:
National Security
“Expect the infiltration of
adversaries into public and
private institutio...
Cybersecurity and Individuals:
“The actions of society coupled with
governmental reinforcement of its
beliefs will be a ma...
Cybersecurity and Businesses:
Organizational Reputation
“Cybersecurity breaches will
continue to stain the
reputation of o...
Cybersecurity and Infrastructure:
5G’n Their Way Out
“5G will allow for increased
connectivity, larger numbers of devices,...
Cybersecurity and Infrastructure:
Explainability
“A lack of AI and Machine
learning explainability towards
cybersecurity p...
Cybersecurity and Infrastructure:
Quantum Leap
“Although, without a doubt there
will continue to be challenges to
build a ...
Cybercrime:
Cerberus of Data Leakage
“For every breach, the
potential for damage by
cybercriminals compounds.”
“Interferen...
Cybercrime:
The Rise of Cyber Militias
Cyber militias, a group who is
willing and able to conduct
cyber-attacks for the be...
Cybercrime:
Defensive Attacks
“More actors both in the
private and public sector will
look for new, innovative ways
to use...
Cybercrime:
Advance Phishing
“Machine learning, AI and its
clusters will be essential to the
advancement of cybersecurity
...
Cybercrime:
Bug Hunters Become Hunted
“Sophisticated and well
financed threat actors will
advance their attacks on bug
hun...
Cybercrime:
Oil Leak or Cloud Leak?
“There will be a heightened interest
for sophisticated actors to infiltrate
cloud prov...
Cybercrime:
Physical Safety
“A single or a few major
incidents associated with data
breach and advanced malicious
attacks ...
Cybercrime:
Bio-Cyberhacking
“As individuals begin using technology in
their bodies for treatment, monitoring of
diseases,...
Cybercrime:
Deepfake and Cybersecurity
“The evolution of deepfake and its
derivatives will continue and, with that, it
wil...
Authors
Brenda Gonzales Guilherme Peterson
Terms of Use
In no way shall GPetrium be liable to you or any involved parties, for any damage or cost due
directly, indir...
You’ve finished this document.
Download and read it offline.
Upcoming SlideShare
What to Upload to SlideShare
Next
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

Share

2020: The Future of Cybersecurity in The Next Decade

Download to read offline

Technology is evolving at a rapid pace, so are threat actors as they continue to find new ways to infiltrate their targets. IoT, 5G, cloud and others will be at the forefront of cybersecurity in the next decade.

Related Books

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

2020: The Future of Cybersecurity in The Next Decade

  1. 1. 2020: The Future of Cybersecurity in The Next Decade www.gpetrium.com
  2. 2. As Weak as its Weakest Links: The Internet of Things “The Internet of Things (IoT) will continue to evolve and create complex ecosystems that are challenging from a cybersecurity standpoint, as the weakest links and new unearthed vulnerabilities will prove to be a continuous threat to the IoT environment”. Further concerns: - Liability re. obsolete infrastructure? - Liability re. malfunction because of integrated environment? Guillherme Peterson, GPetrium
  3. 3. As Weak as its Weakest Links: Company Resources “It will no longer be enough to not be on the list of companies that have faced a cybersecurity breach that year, as investors and analysts will begin pricing cybersecurity risk into the market.” “To decrease cybersecurity risks, companies will need to embark in a cultural and strategic transformation to drive measurable cybersecurity improvements”.
  4. 4. Cybersecurity and Individuals: Comfort Technologies “Executives will need to balance potential reputational damage followed by a security breach with customer demand for such products and proactive spending on R&D to make such products safer.” Brenda Gonzales, GPetrium
  5. 5. Cybersecurity and Individuals: “The private sector will continue to realize that they are not able to fight certain types of cyber threats alone. This will lead to a partial shift in the mindset of certain organizations, leading to increased cooperation, albeit at an arm’s length, with the public sector.” Guillherme Peterson, GPetrium Public & Private Connections
  6. 6. Cybersecurity and Individuals: “Cybersecurity thefts will propel the creation of new business adversaries causing drastic impacts to the competitiveness. Major business losses will follow, leading to some business failure and workforce displacement”. Workforce Displacement Brenda Gonzales, GPetrium
  7. 7. Cybersecurity and Government: Social Credits “The interest in creating an environment with stronger data privacy will grow in some countries, but it will be hampered by the global trend on social credit and its cost- benefit analysis”. Guillherme Peterson, GPetrium
  8. 8. Cybersecurity and Government: Regulatory Compliance “AI and Machine Learning cyber security solutions will go head-to-head against governmental regulations, increasing regulatory compliance scrutiny at all organizational sizes.” Brenda Gonzales, GPetrium
  9. 9. Cybersecurity and Government: National Security “Expect the infiltration of adversaries into public and private institutions to continue. A combination of data breach, social engineering, blackmailing and perceived socio and economic movements in society will be used as tools.” Guillherme Peterson, GPetrium
  10. 10. Cybersecurity and Individuals: “The actions of society coupled with governmental reinforcement of its beliefs will be a major driver as to whether private organizations will hide a cyber breach, increase/ decrease cybersecurity budget and work with peers to decrease potential risks.” Political Stability Brenda Gonzales, GPetrium
  11. 11. Cybersecurity and Businesses: Organizational Reputation “Cybersecurity breaches will continue to stain the reputation of organizations around the world. According to Comparitech, publicly traded companies that have been through a cyber breach have on average underperformed in the NASDAQ.” Guillherme Peterson, GPetrium
  12. 12. Cybersecurity and Infrastructure: 5G’n Their Way Out “5G will allow for increased connectivity, larger numbers of devices, more capable IoT and more. This will power a boom for technological innovation, however, in cybersecurity terms, all the items listed above are simply an exponential increase in threat vectors raising the alarms in cybersecurity departments.” Guilherme Peterson, GPetrium
  13. 13. Cybersecurity and Infrastructure: Explainability “A lack of AI and Machine learning explainability towards cybersecurity processes and decisions will raise red flags at all levels of society. Demand for increased transparency over its actions and decisions will affect future software development.” Brenda Gonzales, GPetrium
  14. 14. Cybersecurity and Infrastructure: Quantum Leap “Although, without a doubt there will continue to be challenges to build a fully functioning quantum computing apparatus, one thing is clear: when fully functional, quantum computing will have a profound change in the very fabric of technology and computing.” Brenda Gonzales, GPetrium
  15. 15. Cybercrime: Cerberus of Data Leakage “For every breach, the potential for damage by cybercriminals compounds.” “Interference in the 2016 United States election will prove to have been just the prototype to much larger scale interferences in the public and private sectors.” Guilherme Peterson, GPetrium
  16. 16. Cybercrime: The Rise of Cyber Militias Cyber militias, a group who is willing and able to conduct cyber-attacks for the benefit or interest of a larger organization, will gain prominence and continue to grow at a fast pace, spreading to a larger portion of the cyber environment. Guillherme Peterson, GPetrium
  17. 17. Cybercrime: Defensive Attacks “More actors both in the private and public sector will look for new, innovative ways to use an attack to their assets as an opportunity to infiltrate the attacker.” Brenda Gonzales, GPetrium
  18. 18. Cybercrime: Advance Phishing “Machine learning, AI and its clusters will be essential to the advancement of cybersecurity firewalls and… cyber attacks.” Guilherme Peterson, GPetrium
  19. 19. Cybercrime: Bug Hunters Become Hunted “Sophisticated and well financed threat actors will advance their attacks on bug hunting prize providers and bug hunters to gain insight on the most prolific bug hunters.” Brenda Gonzales, GPetrium
  20. 20. Cybercrime: Oil Leak or Cloud Leak? “There will be a heightened interest for sophisticated actors to infiltrate cloud providers and its suppliers to gain direct access to data. Issues with improper installation and management of cloud services will continue to be a major cybersecurity challenge to many cloud users.” Guilherme Peterson, GPetrium
  21. 21. Cybercrime: Physical Safety “A single or a few major incidents associated with data breach and advanced malicious attacks with clear physical implications will be a catalyst that pushes certain governments towards policies that are considered to be unacceptable in today’s environment.”Brenda Gonzales, GPetrium
  22. 22. Cybercrime: Bio-Cyberhacking “As individuals begin using technology in their bodies for treatment, monitoring of diseases, enhancements and more, concerns over a malicious actor’s ability to infiltrate such technology and lead to physical harm will increase exponentially.” Guilherme Peterson, GPetrium
  23. 23. Cybercrime: Deepfake and Cybersecurity “The evolution of deepfake and its derivatives will continue and, with that, it will be used for new, more advanced malicious attacks. Deepfake will likely be used as a way to extort and blackmail individuals, families and organizations.” Brenda Gonzales, GPetrium
  24. 24. Authors Brenda Gonzales Guilherme Peterson
  25. 25. Terms of Use In no way shall GPetrium be liable to you or any involved parties, for any damage or cost due directly, indirectly, incidental or consequential led by the use or inability to use the tools or solutions. The individual or organization using the tools or solutions are to take ownership of all risks and responsibilities associated with the tools or solutions. The documents, text, tools, insights, solutions, and other articles (the “Documents”) created by GPetrium.com are considered copyrighted works under Canadian and other foreign copyright laws and are owned by GPetrium. For a full bibliography of all images used in this document or any other request, please contact the author(s). Due to the sensitive nature of the topic, examples have been limited to highly publicized stories. For those interested in enhancing their cybersecurity capabilities and overall digital strategy, contact the authors. GPetrium’s publication do not necessarily represent the views and opinions of its clients. www.gpetrium.com

Technology is evolving at a rapid pace, so are threat actors as they continue to find new ways to infiltrate their targets. IoT, 5G, cloud and others will be at the forefront of cybersecurity in the next decade.

Views

Total views

1,688

On Slideshare

0

From embeds

0

Number of embeds

1,576

Actions

Downloads

9

Shares

0

Comments

0

Likes

0

×