SlideShare a Scribd company logo
1 of 13
Download to read offline
Cybersecurity in 2022
Gabe Schuyler
The state of attack & defense
Austin Forum on Technology and Society


March 1, 2022
Agenda
• Going remote


• Cloud computing


• Automation


• Zero-days


• Internet of things
• Ransom


• Supply chain


• Nation-state actors


• Armed Con
fl
ict


• Q & A
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Gabe Schuyler
• Enterprise Solutions Engineer at Wiz, Inc.


• Long time operations person


• Medium time cybersecurity professional


• Also into wireless hacking, RFID tags, and


using technology for positive social change.


@gabe_sky
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Going remote
• Lock-down


• Bring your own device


• Borrow your work device


• Segment your networks


• Protect all endpoints


• "I'm not a cat"
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Cloud computing
• Cheap and remote


• Unsecured resources


• Crypto-mining


• Cloud security posture management


• Inventory and monitoring


• Department of transportation
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Automation
• Criminals are lazy


• Brute force


• Large-scale phishing


• Password managers and MFA


• Automated response


• Honeypots
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Zero-day and zero-click exploits
• No patch to stop it


• Lucrative job, selling


• Effective against well-defended


• Defense in depth


• Incentivize updates and patches


• NSO group
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Internet of Things
• Valuable data and orchestration


• Firmware updates rare/never


• Stepping stone inside


• Change default passwords


• Segment networks


• Hacked by a
fi
sh tank
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Ransomware
• Lucrative and automatable


• Ransomware as a service


• Double-ransom


• Backups


• Insurance


• Colonial pipeline
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Supply Chain
• Applications "borrow" code


• Enterprises use diverse software


• Often opaque to developers


• Automate security in development process


• Defense in depth & zero trust


• SolarWinds
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Nation states
• Rare but unstoppable


• Disruption and misinformation


• Espionage


• Listen to CISA (and NSA?)


• Insurance ("Acts of War")


• Chinese warship on pause
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Armed Con
fl
ict
• Conspicuously quiet


• DDoS and defacement


• Disinformation


• Trusted sources, veri
fi
ed information


• Protect against splash damage


• Current insanity
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler
Q & A
Gabe Schuyler


@gabe_sky
@gabe_sky
Austin Forum on Technology and Society -- March 2022
Gabe Schuyler

More Related Content

What's hot

What's hot (20)

5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber attacks in Ukraine
Cyber attacks in UkraineCyber attacks in Ukraine
Cyber attacks in Ukraine
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking
HackingHacking
Hacking
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Thick client application security assessment
Thick client  application security assessmentThick client  application security assessment
Thick client application security assessment
 

Similar to Cybersecurity in 2022

Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdfTexas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdfGabriel Schuyler
 
2023 BSides ATX Trending Attack and Defense.pdf
2023 BSides ATX Trending Attack and Defense.pdf2023 BSides ATX Trending Attack and Defense.pdf
2023 BSides ATX Trending Attack and Defense.pdfGabriel Schuyler
 
5G Networks - What's next for Broadband
5G Networks - What's next for Broadband5G Networks - What's next for Broadband
5G Networks - What's next for Broadbandpaul young cpa, cga
 
2022 GrrCON Shifting Right with Policy as Code.pdf
2022 GrrCON Shifting Right with Policy as Code.pdf2022 GrrCON Shifting Right with Policy as Code.pdf
2022 GrrCON Shifting Right with Policy as Code.pdfGabriel Schuyler
 
5G overview for ISEM 2022_Maria Boura_A.pdf
5G overview for ISEM 2022_Maria Boura_A.pdf5G overview for ISEM 2022_Maria Boura_A.pdf
5G overview for ISEM 2022_Maria Boura_A.pdfMaria Boura
 
How to protect your data
How to protect your dataHow to protect your data
How to protect your dataDoKC
 
How to protect your data
How to protect your dataHow to protect your data
How to protect your dataDoKC
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...ijpla
 
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...ijwmn
 
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...ijwmn
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorspaul young cpa, cga
 
Micro Grids and Smart grids for Canada and The world - analysis and trends - ...
Micro Grids and Smart grids for Canada and The world - analysis and trends - ...Micro Grids and Smart grids for Canada and The world - analysis and trends - ...
Micro Grids and Smart grids for Canada and The world - analysis and trends - ...paul young cpa, cga
 
Telecom| 5G Networks| What's Happening
Telecom| 5G Networks| What's HappeningTelecom| 5G Networks| What's Happening
Telecom| 5G Networks| What's Happeningpaul young cpa, cga
 
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...jmicro
 
International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...ijwmn
 
International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...ijpla
 
International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...ijpla
 

Similar to Cybersecurity in 2022 (20)

Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdfTexas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
 
2023 BSides ATX Trending Attack and Defense.pdf
2023 BSides ATX Trending Attack and Defense.pdf2023 BSides ATX Trending Attack and Defense.pdf
2023 BSides ATX Trending Attack and Defense.pdf
 
5G Networks - What's next for Broadband
5G Networks - What's next for Broadband5G Networks - What's next for Broadband
5G Networks - What's next for Broadband
 
2022 GrrCON Shifting Right with Policy as Code.pdf
2022 GrrCON Shifting Right with Policy as Code.pdf2022 GrrCON Shifting Right with Policy as Code.pdf
2022 GrrCON Shifting Right with Policy as Code.pdf
 
5G overview for ISEM 2022_Maria Boura_A.pdf
5G overview for ISEM 2022_Maria Boura_A.pdf5G overview for ISEM 2022_Maria Boura_A.pdf
5G overview for ISEM 2022_Maria Boura_A.pdf
 
How to protect your data
How to protect your dataHow to protect your data
How to protect your data
 
How to protect your data
How to protect your dataHow to protect your data
How to protect your data
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...
 
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...
 
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendors
 
Micro Grids and Smart grids for Canada and The world - analysis and trends - ...
Micro Grids and Smart grids for Canada and The world - analysis and trends - ...Micro Grids and Smart grids for Canada and The world - analysis and trends - ...
Micro Grids and Smart grids for Canada and The world - analysis and trends - ...
 
Telecom| 5G Networks| What's Happening
Telecom| 5G Networks| What's HappeningTelecom| 5G Networks| What's Happening
Telecom| 5G Networks| What's Happening
 
International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...International Conference on Blockchain, Cybersecurity and Internet of Things ...
International Conference on Blockchain, Cybersecurity and Internet of Things ...
 
International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...
 
International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...
 
International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...International Conference on Computer Science and InformationTechnology Advanc...
International Conference on Computer Science and InformationTechnology Advanc...
 

More from Gabriel Schuyler

2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdfGabriel Schuyler
 
Trends in Cloud Security Attack & Defense
Trends in Cloud Security Attack & DefenseTrends in Cloud Security Attack & Defense
Trends in Cloud Security Attack & DefenseGabriel Schuyler
 
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real CloudsPancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real CloudsGabriel Schuyler
 
Automating Security Tests in Development with Docker
Automating Security Tests in Development with DockerAutomating Security Tests in Development with Docker
Automating Security Tests in Development with DockerGabriel Schuyler
 
Dog Days of Devops 2022: Policy as Code
Dog Days of Devops 2022: Policy as CodeDog Days of Devops 2022: Policy as Code
Dog Days of Devops 2022: Policy as CodeGabriel Schuyler
 
fwd:cloudsec 2022: Shifting right with policy-as-code
fwd:cloudsec 2022: Shifting right with policy-as-codefwd:cloudsec 2022: Shifting right with policy-as-code
fwd:cloudsec 2022: Shifting right with policy-as-codeGabriel Schuyler
 
Hope 2022: Just Enough RFID Cloning to be Dangerous
Hope 2022: Just Enough RFID Cloning to be DangerousHope 2022: Just Enough RFID Cloning to be Dangerous
Hope 2022: Just Enough RFID Cloning to be DangerousGabriel Schuyler
 
Kernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsKernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsGabriel Schuyler
 
ShmooCon 2022: RFID Key Cloning for Angry Bikers
ShmooCon 2022: RFID Key Cloning for Angry BikersShmooCon 2022: RFID Key Cloning for Angry Bikers
ShmooCon 2022: RFID Key Cloning for Angry BikersGabriel Schuyler
 
Migrating Puppet 3 to 4 -- Code Changes
Migrating Puppet 3 to 4 -- Code ChangesMigrating Puppet 3 to 4 -- Code Changes
Migrating Puppet 3 to 4 -- Code ChangesGabriel Schuyler
 
IC3 -- Configuration Management 101
IC3 -- Configuration Management 101IC3 -- Configuration Management 101
IC3 -- Configuration Management 101Gabriel Schuyler
 

More from Gabriel Schuyler (11)

2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf
 
Trends in Cloud Security Attack & Defense
Trends in Cloud Security Attack & DefenseTrends in Cloud Security Attack & Defense
Trends in Cloud Security Attack & Defense
 
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real CloudsPancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
 
Automating Security Tests in Development with Docker
Automating Security Tests in Development with DockerAutomating Security Tests in Development with Docker
Automating Security Tests in Development with Docker
 
Dog Days of Devops 2022: Policy as Code
Dog Days of Devops 2022: Policy as CodeDog Days of Devops 2022: Policy as Code
Dog Days of Devops 2022: Policy as Code
 
fwd:cloudsec 2022: Shifting right with policy-as-code
fwd:cloudsec 2022: Shifting right with policy-as-codefwd:cloudsec 2022: Shifting right with policy-as-code
fwd:cloudsec 2022: Shifting right with policy-as-code
 
Hope 2022: Just Enough RFID Cloning to be Dangerous
Hope 2022: Just Enough RFID Cloning to be DangerousHope 2022: Just Enough RFID Cloning to be Dangerous
Hope 2022: Just Enough RFID Cloning to be Dangerous
 
Kernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsKernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native Workloads
 
ShmooCon 2022: RFID Key Cloning for Angry Bikers
ShmooCon 2022: RFID Key Cloning for Angry BikersShmooCon 2022: RFID Key Cloning for Angry Bikers
ShmooCon 2022: RFID Key Cloning for Angry Bikers
 
Migrating Puppet 3 to 4 -- Code Changes
Migrating Puppet 3 to 4 -- Code ChangesMigrating Puppet 3 to 4 -- Code Changes
Migrating Puppet 3 to 4 -- Code Changes
 
IC3 -- Configuration Management 101
IC3 -- Configuration Management 101IC3 -- Configuration Management 101
IC3 -- Configuration Management 101
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 

Recently uploaded (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 

Cybersecurity in 2022

  • 1. Cybersecurity in 2022 Gabe Schuyler The state of attack & defense Austin Forum on Technology and Society March 1, 2022
  • 2. Agenda • Going remote • Cloud computing • Automation • Zero-days • Internet of things • Ransom • Supply chain • Nation-state actors • Armed Con fl ict • Q & A @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 3. Gabe Schuyler • Enterprise Solutions Engineer at Wiz, Inc. • Long time operations person • Medium time cybersecurity professional • Also into wireless hacking, RFID tags, and 
 using technology for positive social change. @gabe_sky @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 4. Going remote • Lock-down • Bring your own device • Borrow your work device 
 • Segment your networks • Protect all endpoints 
 • "I'm not a cat" @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 5. Cloud computing • Cheap and remote • Unsecured resources • Crypto-mining 
 • Cloud security posture management • Inventory and monitoring 
 • Department of transportation @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 6. Automation • Criminals are lazy • Brute force • Large-scale phishing 
 • Password managers and MFA • Automated response 
 • Honeypots @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 7. Zero-day and zero-click exploits • No patch to stop it • Lucrative job, selling • Effective against well-defended 
 • Defense in depth • Incentivize updates and patches 
 • NSO group @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 8. Internet of Things • Valuable data and orchestration • Firmware updates rare/never • Stepping stone inside 
 • Change default passwords • Segment networks 
 • Hacked by a fi sh tank @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 9. Ransomware • Lucrative and automatable • Ransomware as a service • Double-ransom 
 • Backups • Insurance 
 • Colonial pipeline @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 10. Supply Chain • Applications "borrow" code • Enterprises use diverse software • Often opaque to developers 
 • Automate security in development process • Defense in depth & zero trust 
 • SolarWinds @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 11. Nation states • Rare but unstoppable • Disruption and misinformation • Espionage 
 • Listen to CISA (and NSA?) • Insurance ("Acts of War") 
 • Chinese warship on pause @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 12. Armed Con fl ict • Conspicuously quiet • DDoS and defacement • Disinformation 
 • Trusted sources, veri fi ed information • Protect against splash damage 
 • Current insanity @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler
  • 13. Q & A Gabe Schuyler @gabe_sky @gabe_sky Austin Forum on Technology and Society -- March 2022 Gabe Schuyler